General
-
Target
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676
-
Size
977KB
-
Sample
241011-18z7gaxbpd
-
MD5
8ca2a2f8bf3712a6b5aae42f8d1f68a9
-
SHA1
24f1b6863ce5c2c1f3a4c8b903225396c13c2e48
-
SHA256
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676
-
SHA512
2ba0b7da5291db079342e64746f1c4cdc78eca563743afe0f07402b62ba7e207f748945a9d92c71fa593f28709830cd93f16c68373e89b9fbf4bccd8e4e5f672
-
SSDEEP
24576:yHLmCiIhDFr4UhoNFhhX7D9pJcB40+rIU57eUUg90WbHXo:/m14UhoNFhhHp0+rFReFJKo
Static task
static1
Behavioral task
behavioral1
Sample
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTE4NzkxODczMDE4NTk0NTE0OA.G66vie.kA0nLo-eD-2rd6nK3M-Fh4qAb4220iowO4cbo4
-
server_id
1187724075263598592
Targets
-
-
Target
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676
-
Size
977KB
-
MD5
8ca2a2f8bf3712a6b5aae42f8d1f68a9
-
SHA1
24f1b6863ce5c2c1f3a4c8b903225396c13c2e48
-
SHA256
68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676
-
SHA512
2ba0b7da5291db079342e64746f1c4cdc78eca563743afe0f07402b62ba7e207f748945a9d92c71fa593f28709830cd93f16c68373e89b9fbf4bccd8e4e5f672
-
SSDEEP
24576:yHLmCiIhDFr4UhoNFhhX7D9pJcB40+rIU57eUUg90WbHXo:/m14UhoNFhhHp0+rFReFJKo
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-