General
-
Target
pikmin.txt
-
Size
508B
-
Sample
240716-bytt9sygjj
-
MD5
15cfefa805d48ab3ae4030dfd6f3ab3b
-
SHA1
77af69b52616f2a487f2acdb0236e85f18b85ef1
-
SHA256
16bb67a19701b6501af30450601c2c29e1264e47157dcec20754f27d1dc4cd03
-
SHA512
45880fffe5dec2b553d8b27dad929290553613cd7228f55d396fa1514e2f93e0eb2e963df1651fcc1d6d1b8e3885908f86da674ff1ae90ff5380d8a7e19194df
Static task
static1
Behavioral task
behavioral1
Sample
pikmin.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
pikmin.txt
Resource
win11-20240709-en
Malware Config
Extracted
discordrat
-
discord_token
MTI2MjU3ODQwOTUxOTcxMDM0MA.GM8Qz2.oHZL__hfnIDjXge1Rg3E4fIJEn7S49wVYLqIfA
-
server_id
1262574013796978799
Targets
-
-
Target
pikmin.txt
-
Size
508B
-
MD5
15cfefa805d48ab3ae4030dfd6f3ab3b
-
SHA1
77af69b52616f2a487f2acdb0236e85f18b85ef1
-
SHA256
16bb67a19701b6501af30450601c2c29e1264e47157dcec20754f27d1dc4cd03
-
SHA512
45880fffe5dec2b553d8b27dad929290553613cd7228f55d396fa1514e2f93e0eb2e963df1651fcc1d6d1b8e3885908f86da674ff1ae90ff5380d8a7e19194df
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-