General
-
Target
Client-built.exe
-
Size
78KB
-
Sample
241024-rvw38avdmj
-
MD5
e7619dea03aabbb3b878797dade39f74
-
SHA1
f33fa0a714510ee2e51f62e2b6e2b4167cdf2f09
-
SHA256
35aab316cd44d29aa09a4b470cb6e645b3a23c33ca1f2b3861ba2c9fa78e309f
-
SHA512
f8c846b05b3c19beaaa1aefde43bcd0d5baa19e63dccaeaa1851c6b9b2da631cbd537116750122197a872e0be34b8bf2ec5cb8c22dd9592ea37b056c3d0dc44b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+cPIC:5Zv5PDwbjNrmAE+QIC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTI0MTYxNzM4MTMzMjM1MzA4NQ.GA3DCO.ayqPnboYWnJ5Am6Uc_homjnJm4X0Uts_rRRS7g
-
server_id
1299013032357269526
Targets
-
-
Target
Client-built.exe
-
Size
78KB
-
MD5
e7619dea03aabbb3b878797dade39f74
-
SHA1
f33fa0a714510ee2e51f62e2b6e2b4167cdf2f09
-
SHA256
35aab316cd44d29aa09a4b470cb6e645b3a23c33ca1f2b3861ba2c9fa78e309f
-
SHA512
f8c846b05b3c19beaaa1aefde43bcd0d5baa19e63dccaeaa1851c6b9b2da631cbd537116750122197a872e0be34b8bf2ec5cb8c22dd9592ea37b056c3d0dc44b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+cPIC:5Zv5PDwbjNrmAE+QIC
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-