General
-
Target
ddos.zip
-
Size
759B
-
Sample
241023-vxy75stekr
-
MD5
4bfec0144e947b841ad093f4e4d0e269
-
SHA1
524f22beb96cf450822e069d176b6b37299fe202
-
SHA256
42b176fc5efa8e8d1a7a21afc72dbb23a81baaa2a0938a2c5d267459139abe48
-
SHA512
88c147fbf04b905a2ccddd5fd9e8cc1d83e9d7f5904568114010106a8e05f2f8150e5fe6630d1374e52f61eaba2cf811e7540895dd9ef176476e291ef9d5af18
Static task
static1
Behavioral task
behavioral1
Sample
asd.bat
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
asd.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTI5Njg5NDEwMjY0NTkwMzQwMA.GffxcT.wWuk4gdi5T-RNzCLfFQ4XgAEMO4ZjpXcRu5E5Y
-
server_id
1293738586679672945
Targets
-
-
Target
asd.bat
-
Size
1KB
-
MD5
0dababeef5a7a86809d847382772d821
-
SHA1
612be301ee1bc7a422f79b2d17822ee2244efc4c
-
SHA256
56af74c6f17f1e987ace45d8ec180ed38d221f2fdfe9d601bdec2d703689bdb4
-
SHA512
1ec9342d34914503dc475fd5fb300cbbb2ace1e9b6e8cc1b9221dd3468eb64a1e0d7f3d0c6f8427207239c61c4b8fb87da89f88f6920b95ef928dd1214d17d6a
Score10/10-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Deletes itself
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-