General
-
Target
Gamebattles_Credit_Adder.exe
-
Size
519KB
-
Sample
240801-pgv8nazfml
-
MD5
f5b1ed390659aa3f894a576ba49cc232
-
SHA1
fc26ae14db4fda8e4cba79315d2c3a296cbcc35a
-
SHA256
914b857e803c19670ce854ab164d5047ede50fca5c3dd66f50afafbfedb6c625
-
SHA512
6a5d054633baa4b088cd3d3d3c6b94ca1a1bc3494e970caba05b9bb2f783f1ba68372612b7c22a639d8e284f52578a078f0cc07a3abc00d2034a156e163e46e0
-
SSDEEP
6144:3DvO5hBFSeDMhto8S+L6SESUNLWBq9NWm9NXeAPs2tZE1OvZiqd3nxPnH0U+HM2f:TvOO5m4ISUAqLWsHpZuOvg23Z2HG/H
Static task
static1
Behavioral task
behavioral1
Sample
Gamebattles_Credit_Adder.exe
Resource
win10v2004-20240730-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
killer999
Extracted
discordrat
-
discord_token
https://discord.com/api/webhooks/1161788001135902741/ztxjwKAIu6KPaNbcXND5hC4MilU54lL_76bikPC1LMquEXQShGawLBLyZCTJXL0MKePS
-
server_id
1143900149777702913
Targets
-
-
Target
Gamebattles_Credit_Adder.exe
-
Size
519KB
-
MD5
f5b1ed390659aa3f894a576ba49cc232
-
SHA1
fc26ae14db4fda8e4cba79315d2c3a296cbcc35a
-
SHA256
914b857e803c19670ce854ab164d5047ede50fca5c3dd66f50afafbfedb6c625
-
SHA512
6a5d054633baa4b088cd3d3d3c6b94ca1a1bc3494e970caba05b9bb2f783f1ba68372612b7c22a639d8e284f52578a078f0cc07a3abc00d2034a156e163e46e0
-
SSDEEP
6144:3DvO5hBFSeDMhto8S+L6SESUNLWBq9NWm9NXeAPs2tZE1OvZiqd3nxPnH0U+HM2f:TvOO5m4ISUAqLWsHpZuOvg23Z2HG/H
Score10/10-
Executes dropped EXE
-
Drops file in System32 directory
-