General
-
Target
installer.bat
-
Size
865B
-
Sample
240913-wx49ts1hqc
-
MD5
2c19299072040e9e7dd5cef468da267b
-
SHA1
3ab6fad3a10abf8fb5b703eaa3d60244f18975dc
-
SHA256
07b5ed831d02ec164c13d86d09faa86be7029d090ea12602d5532918ed6f2b86
-
SHA512
c8519189baf5601af7267f6e38617f58ba16bdbc9b026d7870ac7e584481652f3619e1569b42a9a9d392e6a9d452ca14e63ff2fc1fc5397db45538b9e819448d
Static task
static1
Behavioral task
behavioral1
Sample
installer.bat
Resource
win11-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTI4MzkwMzM1MjcxOTAxNTk2Ng.GGkiFE.UJeAu2wEPM4KGVLI7BPdjjiBL-EKR92XuDzB5E
-
server_id
1281866805501100106
Targets
-
-
Target
installer.bat
-
Size
865B
-
MD5
2c19299072040e9e7dd5cef468da267b
-
SHA1
3ab6fad3a10abf8fb5b703eaa3d60244f18975dc
-
SHA256
07b5ed831d02ec164c13d86d09faa86be7029d090ea12602d5532918ed6f2b86
-
SHA512
c8519189baf5601af7267f6e38617f58ba16bdbc9b026d7870ac7e584481652f3619e1569b42a9a9d392e6a9d452ca14e63ff2fc1fc5397db45538b9e819448d
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-