General
-
Target
bd79917c897e0fdd3795030bf103a9e4.bin
-
Size
3.5MB
-
Sample
241011-1xpxcswejg
-
MD5
01081cabed89f9f3dcbc72a29f5ca220
-
SHA1
2ef6356b4610277b2c13e53793684eb6af339727
-
SHA256
18b556bbca4178039cdf06572cf769b823e834f481d921256f3f00108cd8ddcd
-
SHA512
eb79af17175daf93944410585c4779ad5c1a08a653fb940d8bc378d42152496c6ede352e53fcafba23ac1612e785621e974e565e29179d70bf8f8413347b6fdd
-
SSDEEP
98304:Gn2zEJtAdjA1EFwL0gGoyhpIJgCS8zRtBA1XIV:2VudkOc9JgIRY1XIV
Static task
static1
Behavioral task
behavioral1
Sample
9eb24d44ddc752f420e32938606a4fe14f96216a2b501b8f735399fc7bfb85d2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9eb24d44ddc752f420e32938606a4fe14f96216a2b501b8f735399fc7bfb85d2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTE4NjgzODQyOTA0NTA5NjQ3OQ.GoqCSI.ugX1sZEdCVUjFhLRcYusQjP4Sel7ZEhBLDAEMc
-
server_id
1186838787922350182
Targets
-
-
Target
9eb24d44ddc752f420e32938606a4fe14f96216a2b501b8f735399fc7bfb85d2.exe
-
Size
3.7MB
-
MD5
bd79917c897e0fdd3795030bf103a9e4
-
SHA1
6a653df126ff4f6b89fddc650ab2fa15bbd72a24
-
SHA256
9eb24d44ddc752f420e32938606a4fe14f96216a2b501b8f735399fc7bfb85d2
-
SHA512
6f379440476dfdc4b0d7a7d0bb66fca38e8780ebf8f3ac2a19fae8155f1ec90eb91f40b92b8fdd83341dec77410dfbbe6a12871d85f107867976a527a181ea85
-
SSDEEP
98304:fjaIiMg+4Q3S1twkggVEg0Yb4WmOicuEdprJjJqMjn3kZkXk:b6Mg+4QS1twkdVbtiXEvJFq2n0Zk0
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-