Overview
overview
3Static
static
1Discord-Nu...in.zip
windows7-x64
1Discord-Nu...in.zip
windows10-2004-x64
1Discord-Nu...DME.md
windows7-x64
3Discord-Nu...DME.md
windows10-2004-x64
3Discord-Nu...bot.py
windows7-x64
3Discord-Nu...bot.py
windows10-2004-x64
3Discord-Nu...g.json
windows7-x64
3Discord-Nu...g.json
windows10-2004-x64
3Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
Discord-Nuker-main.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Discord-Nuker-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Discord-Nuker-main/README.md
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Discord-Nuker-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Discord-Nuker-main/bot.py
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Discord-Nuker-main/bot.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Discord-Nuker-main/config.json
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Discord-Nuker-main/config.json
Resource
win10v2004-20241007-en
General
-
Target
Discord-Nuker-main/bot.py
-
Size
2KB
-
MD5
5fe5f6cdee058ed6a88f837a67581559
-
SHA1
f9b50b372b7b529533dc042536b5bab521371f0c
-
SHA256
33736c324804cf303e265248c8197cc8952b7c85149c86fd55c21a88aeada98e
-
SHA512
18ee606ab6921245f35988de5d8351050779f43f5eace882b8d89d06742f5a3f08c5770bcee8ee876663e592dbe1d17de2adc4f087655d7ab32e0b66c305fdbd
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 604 OpenWith.exe