General

  • Target

    Discord Follow Bot.exe

  • Size

    17.9MB

  • Sample

    240925-h7fsbsseln

  • MD5

    96d014e3c6ea0eff7df8e148dcbd1b2e

  • SHA1

    1b5fca8b2312724dc447c8c2d4d2626cbc1aa8eb

  • SHA256

    5edba334cbfacde55417733421edd82e52529e852dd6898cf0390f209b2493a0

  • SHA512

    4e8e7643ab0c69f2975cc0d5222dde8ac2c612e08315ee10f83afb4364b6cc71d911d00a48622e681bc78ca9ad6a390ec3989056fde62f7751047816a99109a8

  • SSDEEP

    393216:wqPnLFXlrGBQ+DOETgsvfG5gU6MtuvEKqNceEimq:xPLFXNGBQ/E0fzn2ex

Malware Config

Targets

    • Target

      Discord Follow Bot.exe

    • Size

      17.9MB

    • MD5

      96d014e3c6ea0eff7df8e148dcbd1b2e

    • SHA1

      1b5fca8b2312724dc447c8c2d4d2626cbc1aa8eb

    • SHA256

      5edba334cbfacde55417733421edd82e52529e852dd6898cf0390f209b2493a0

    • SHA512

      4e8e7643ab0c69f2975cc0d5222dde8ac2c612e08315ee10f83afb4364b6cc71d911d00a48622e681bc78ca9ad6a390ec3989056fde62f7751047816a99109a8

    • SSDEEP

      393216:wqPnLFXlrGBQ+DOETgsvfG5gU6MtuvEKqNceEimq:xPLFXNGBQ/E0fzn2ex

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks