Overview
overview
10Static
static
10AutoDiscorder.exe
windows7-x64
7AutoDiscorder.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 17:33
Behavioral task
behavioral1
Sample
AutoDiscorder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AutoDiscorder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
AutoDiscorder.exe
-
Size
80.7MB
-
MD5
2941d21bc6e92c5104952271e4aa3210
-
SHA1
4147deee44f28ce68fd31e6585271f31adb3667b
-
SHA256
c696bc5fe1503ac12820871081779df6aa799511277e52635575dc11ec31d841
-
SHA512
4a7c55e08d5c1f08c6f8225d0d3970f2b6b6c2f062508cca449c5e51709de55115e59452b6028c764e3dde6eb12676082818f17d51541f28a8d6461a5d62dcbc
-
SSDEEP
1572864:xXGKlqWLH00hSk8IpG7V+VPhqclE7plifiYgj+h58sMwVerlFGp0cJ5j:wKMmNSkB05awcIwB5Zeru7j
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 676 AutoDiscorder.exe -
resource yara_rule behavioral1/files/0x0003000000020b63-1264.dat upx behavioral1/memory/676-1266-0x000007FEF5A80000-0x000007FEF6069000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 676 1852 AutoDiscorder.exe 30 PID 1852 wrote to memory of 676 1852 AutoDiscorder.exe 30 PID 1852 wrote to memory of 676 1852 AutoDiscorder.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\AutoDiscorder.exe"C:\Users\Admin\AppData\Local\Temp\AutoDiscorder.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\AutoDiscorder.exe"C:\Users\Admin\AppData\Local\Temp\AutoDiscorder.exe"2⤵
- Loads dropped DLL
PID:676
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5546cc5fe76abc35fdbf92f682124e23d
SHA15c1030752d32aa067b49125194befee7b3ee985a
SHA25643bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720