Resubmissions

09/08/2024, 07:33

240809-jdrs6s1hmf 7

General

  • Target

    Discord Lite.exe

  • Size

    45.5MB

  • Sample

    240809-jdrs6s1hmf

  • MD5

    36302e8fdc64c2e94820810b5a6ec40d

  • SHA1

    e5dc22d24c810449eeae33576e49bbe0dca78067

  • SHA256

    4abed82bdcc164abb747b262bfda11cea3a1a2b050066e506cfe6f22cd8373f7

  • SHA512

    39f6acd828bda4b927b5aa67cd748f1226a954dd8314f58360a741ca28067ea18ae6e582efc2d5fbf6e3c75584683a790ed8bbac44e4ba902bfe1ba48b465ed9

  • SSDEEP

    786432:T8GNKK+e2BzwkrZIcZL9M4//EzJu6nvXTA0l1ss49rKQaP2CJOYiW67wNA+dXiZ1:wbJTr5X76nvjA0lsX7CJO1W67wNAK0

Malware Config

Targets

    • Target

      Discord Lite.exe

    • Size

      45.5MB

    • MD5

      36302e8fdc64c2e94820810b5a6ec40d

    • SHA1

      e5dc22d24c810449eeae33576e49bbe0dca78067

    • SHA256

      4abed82bdcc164abb747b262bfda11cea3a1a2b050066e506cfe6f22cd8373f7

    • SHA512

      39f6acd828bda4b927b5aa67cd748f1226a954dd8314f58360a741ca28067ea18ae6e582efc2d5fbf6e3c75584683a790ed8bbac44e4ba902bfe1ba48b465ed9

    • SSDEEP

      786432:T8GNKK+e2BzwkrZIcZL9M4//EzJu6nvXTA0l1ss49rKQaP2CJOYiW67wNA+dXiZ1:wbJTr5X76nvjA0lsX7CJO1W67wNAK0

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks