General
-
Target
OmeTV-Loading.mp4
-
Size
16.7MB
-
Sample
240930-s3ve2ashjr
-
MD5
ab395e124b59af38ca0096278d1e6b71
-
SHA1
0befcefb23156e955fa4cdb5283e008e570ed643
-
SHA256
a71ca59eaebc49cc831700a9835fd7f1028cdb4ac1410e74b7a51b46cff01c3f
-
SHA512
029966b2db1ffd735ccfbd17ec06e19d34f63db2aa91f8df77aa6df69e5318a9cc820fc52f84f2837bd2e557c47d7865df4aaa364070f0f34c752a5a85a2601c
-
SSDEEP
393216:RYzCryzVBDKU84xCCepH/hdB7cLNpAde0wLhmDjExj:RYmryzVBE53dYMv80M1
Static task
static1
Behavioral task
behavioral1
Sample
OmeTV-Loading.mp4
Resource
win10v2004-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTI5MDMzNzg3MDMxMzI5NTkyNg.GBPjDG.gaLsW55T8B4V8KGD5_L2qphf5IRxNpBLK1eRyA
-
server_id
1290337683041685594
Targets
-
-
Target
OmeTV-Loading.mp4
-
Size
16.7MB
-
MD5
ab395e124b59af38ca0096278d1e6b71
-
SHA1
0befcefb23156e955fa4cdb5283e008e570ed643
-
SHA256
a71ca59eaebc49cc831700a9835fd7f1028cdb4ac1410e74b7a51b46cff01c3f
-
SHA512
029966b2db1ffd735ccfbd17ec06e19d34f63db2aa91f8df77aa6df69e5318a9cc820fc52f84f2837bd2e557c47d7865df4aaa364070f0f34c752a5a85a2601c
-
SSDEEP
393216:RYzCryzVBDKU84xCCepH/hdB7cLNpAde0wLhmDjExj:RYmryzVBE53dYMv80M1
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-