General
-
Target
trojan.py
-
Size
15KB
-
Sample
240826-qxzfpaxfpm
-
MD5
bc9ae5f0b94e2b380421027f89b7413b
-
SHA1
e336eb7c248b3bf2a8f453b9db58795551bc0f72
-
SHA256
b7edf054bc4923240bac135058249de85b62184ee75bdbd68bae0e380e1420bf
-
SHA512
f7b45a64df3357ea144ab0e2dc1408f2b00b880ef39853f15e0929cd8225eae0eabf3b28197970af925cff763793cf806865c263470f31f02b27676d4374e133
-
SSDEEP
192:TWNLqfvfdFBru8jlhnUqX/X9yCLIOYUj9EXRsmsatvKl0LO0:hDpjlhUM9j9EXPtvKD0
Static task
static1
Behavioral task
behavioral1
Sample
trojan.py
Resource
win11-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTI3NjczNTc4MzM5MDE1MDcxNw.Gucx-l.1ksiq-PyzVjusluKhzfCIJPQoDWzqOajnWtLwk
-
server_id
1275570590962683925
Targets
-
-
Target
trojan.py
-
Size
15KB
-
MD5
bc9ae5f0b94e2b380421027f89b7413b
-
SHA1
e336eb7c248b3bf2a8f453b9db58795551bc0f72
-
SHA256
b7edf054bc4923240bac135058249de85b62184ee75bdbd68bae0e380e1420bf
-
SHA512
f7b45a64df3357ea144ab0e2dc1408f2b00b880ef39853f15e0929cd8225eae0eabf3b28197970af925cff763793cf806865c263470f31f02b27676d4374e133
-
SSDEEP
192:TWNLqfvfdFBru8jlhnUqX/X9yCLIOYUj9EXRsmsatvKl0LO0:hDpjlhUM9j9EXPtvKD0
Score10/10-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-