General
-
Target
asd.bat
-
Size
1KB
-
Sample
241018-25l14svhlm
-
MD5
0dababeef5a7a86809d847382772d821
-
SHA1
612be301ee1bc7a422f79b2d17822ee2244efc4c
-
SHA256
56af74c6f17f1e987ace45d8ec180ed38d221f2fdfe9d601bdec2d703689bdb4
-
SHA512
1ec9342d34914503dc475fd5fb300cbbb2ace1e9b6e8cc1b9221dd3468eb64a1e0d7f3d0c6f8427207239c61c4b8fb87da89f88f6920b95ef928dd1214d17d6a
Static task
static1
Behavioral task
behavioral1
Sample
asd.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTI5Njg5NDEwMjY0NTkwMzQwMA.GbbBFh.ZTr18FyMmzROaUjB4OeMEYamtttj4Hm8E7t2kA
-
server_id
1293738586679672945
Targets
-
-
Target
asd.bat
-
Size
1KB
-
MD5
0dababeef5a7a86809d847382772d821
-
SHA1
612be301ee1bc7a422f79b2d17822ee2244efc4c
-
SHA256
56af74c6f17f1e987ace45d8ec180ed38d221f2fdfe9d601bdec2d703689bdb4
-
SHA512
1ec9342d34914503dc475fd5fb300cbbb2ace1e9b6e8cc1b9221dd3468eb64a1e0d7f3d0c6f8427207239c61c4b8fb87da89f88f6920b95ef928dd1214d17d6a
Score10/10-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-