General
-
Target
Legends Forever - Game.exe
-
Size
103.6MB
-
Sample
241109-nbgyeasmfy
-
MD5
5365793f1d0480f951074892e81cd92a
-
SHA1
8bf692d90306e5f8ef734596384e7d2289b803f6
-
SHA256
8f98b9295b615636382d42add12e1fee1bb951c4d40f59c42d50f65e7f7ecf38
-
SHA512
c12febabf3eba6661475c2d173782f9681cda6d73ce633080ca0e506991246f2176301ad12769d92e5cd1467774cb7da82681245ea6eacd77570a1486bdc7293
-
SSDEEP
3145728:gnGir7rS6xjKcBanL2qHO5iVAunGQbRe0zJcBx7Z2:P0nSWNaBHCin1XcBu
Behavioral task
behavioral1
Sample
Legends Forever - Game.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Legends Forever - Game.exe
-
Size
103.6MB
-
MD5
5365793f1d0480f951074892e81cd92a
-
SHA1
8bf692d90306e5f8ef734596384e7d2289b803f6
-
SHA256
8f98b9295b615636382d42add12e1fee1bb951c4d40f59c42d50f65e7f7ecf38
-
SHA512
c12febabf3eba6661475c2d173782f9681cda6d73ce633080ca0e506991246f2176301ad12769d92e5cd1467774cb7da82681245ea6eacd77570a1486bdc7293
-
SSDEEP
3145728:gnGir7rS6xjKcBanL2qHO5iVAunGQbRe0zJcBx7Z2:P0nSWNaBHCin1XcBu
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
aaaeca514d98795f954c1f2eebb18881
-
SHA1
6331352aada5256452c43545bb6593958602a20c
-
SHA256
a808291bd70bbd15bedd818ef25a1dbcfbf548330fd9ddf5244143ec3eb66cc6
-
SHA512
ec9c019d0061103e1e1b3db7feb346136e5e4f447804f9586aacdd7da3c9b877bda1221735b08fc44586cd443b8909664a22bb90ce3a4230402357d35fe80883
-
SSDEEP
384:nGC7RYmnXavkLPJrltcshntQ5Maa2holHVg:nGCuvkL9ltcsttQ5MaaCgHVg
Score3/10 -
-
-
Target
get_cookies.pyc
-
Size
9KB
-
MD5
b97f0689742bd69af8900cd3731c5294
-
SHA1
28ccff4aa6009fc86d4561e5bc37ea2fb175a689
-
SHA256
b080857887222e4c048bba2d7bb3ebc25cc26f31bb26f645fafc01de4e46a03c
-
SHA512
9b2c471688fee5cb3d1112ec0d594f5c16371dbb6a1dd30668f64746f2073cea377ca6797928e67bfc933e03c52d819ec676f00a115ef3afa4eeb240daf71883
-
SSDEEP
96:nlNatjbBMMKiNW8Zxh9ybA6HUWc4/xIgBZFLjH2K8BXFxUBvF/A7qx3MlMFztwX3:lNahBeiNR9QfUF2x3NC79F21aGaqDAht
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Virtualization/Sandbox Evasion
1