General
-
Target
catalyst mapper.exe
-
Size
75KB
-
Sample
240806-a7z7zaxgnb
-
MD5
107d71e92ff83fa8d051bc6b55bf6cf2
-
SHA1
53f75a688187ba0af9a1ef8233f99a8698ee8872
-
SHA256
ae77dfa2d9cf1b4d2a8a6d9ec02534a389d41ae52930724aaf6611d7b510e6c9
-
SHA512
2da422b599a0e80f52eee68136a9826fc12436fd10a614f5d30c1706a12c5a4b94d67034957f829fe3a84adb32d120ca1b71923ad73aa7d290a308a4c55e339e
-
SSDEEP
768:q82U3ydQEeFDdBc7gz3BE0btciNnA69g4lm:IUXVFAkz3BJbtlB3m
Static task
static1
Behavioral task
behavioral1
Sample
catalyst mapper.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTI1NjMyMjA1MjI4NjA1ODU4MQ.GXaTOL.L1Bde1kmFmXuyZ3LK4kGy4Ab9YhMt8b3KUVyNU
-
server_id
1174076539189612677
Targets
-
-
Target
catalyst mapper.exe
-
Size
75KB
-
MD5
107d71e92ff83fa8d051bc6b55bf6cf2
-
SHA1
53f75a688187ba0af9a1ef8233f99a8698ee8872
-
SHA256
ae77dfa2d9cf1b4d2a8a6d9ec02534a389d41ae52930724aaf6611d7b510e6c9
-
SHA512
2da422b599a0e80f52eee68136a9826fc12436fd10a614f5d30c1706a12c5a4b94d67034957f829fe3a84adb32d120ca1b71923ad73aa7d290a308a4c55e339e
-
SSDEEP
768:q82U3ydQEeFDdBc7gz3BE0btciNnA69g4lm:IUXVFAkz3BJbtlB3m
Score10/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-