General
-
Target
BfIgOz7.exe
-
Size
6.8MB
-
Sample
240915-d9zk1athnn
-
MD5
29daf7a58aacdc2459d9145039474754
-
SHA1
df7807760855e648920c85c29b12e2e817930729
-
SHA256
73ffdb5bc29185f6c68ea22d571859218635a17bad466d4c5aee1b4a3421dfb1
-
SHA512
e1db029d471eede7cfcecf5428b8d7669c4655b5d4a7c854fd952894c9e5d3c0497cd741235a9c312cc08c8fb811f051d1756264b585ec4e0f98a982d65f803e
-
SSDEEP
98304:o1kTd/1SqRWF/A0E/CoSMWjILQjMhAjUc7DL5s:WkTd7RWF/I/ZWjsjajUc72
Static task
static1
Behavioral task
behavioral1
Sample
BfIgOz7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
BfIgOz7.exe
Resource
win11-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTI4NDY3NDQ5OTc5ODc2NTczOA.GRsRSd.UW5uwQ1usFhHH7EewkpyCqw589sAshmfAmxuZg
-
server_id
1284674413421133905
Targets
-
-
Target
BfIgOz7.exe
-
Size
6.8MB
-
MD5
29daf7a58aacdc2459d9145039474754
-
SHA1
df7807760855e648920c85c29b12e2e817930729
-
SHA256
73ffdb5bc29185f6c68ea22d571859218635a17bad466d4c5aee1b4a3421dfb1
-
SHA512
e1db029d471eede7cfcecf5428b8d7669c4655b5d4a7c854fd952894c9e5d3c0497cd741235a9c312cc08c8fb811f051d1756264b585ec4e0f98a982d65f803e
-
SSDEEP
98304:o1kTd/1SqRWF/A0E/CoSMWjILQjMhAjUc7DL5s:WkTd7RWF/I/ZWjsjajUc72
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-