General
-
Target
vison.exe
-
Size
708KB
-
Sample
241111-bagvssskdn
-
MD5
51d6819e3fb246c54b31fe8aff8627c0
-
SHA1
d0b0790c2ec591684ae72588d0aa8d68642a1e4a
-
SHA256
34bd1f86f1c5c37a2200160019e828a16b1d2efa333099814a6c51c075bfd349
-
SHA512
c1db0d56c936a079b80cabfbbaec3fc042dea6b765283cb1481193dc05dc55ca313b71d1847935c741672d7bb63e9acef2bbbead4b5b9c5c389c6191ae71f080
-
SSDEEP
12288:PLMEalqxXblqoRX5qbfphLxaOS3CPqv0Ra6CgLc4rvGSlEkK3dHsZix:DqaXNabfphLxaVSPqvca6COBlaldx
Static task
static1
Behavioral task
behavioral1
Sample
vison.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
discordrat
-
discord_token
MTMwNTIyNjM4MTE3MjY3MDQ5NA.GefVhh.4NM9q0Xf2sO6mHqumTUxU-PopzLhDvRYkm6O3A
-
server_id
1290828168563003412
Targets
-
-
Target
vison.exe
-
Size
708KB
-
MD5
51d6819e3fb246c54b31fe8aff8627c0
-
SHA1
d0b0790c2ec591684ae72588d0aa8d68642a1e4a
-
SHA256
34bd1f86f1c5c37a2200160019e828a16b1d2efa333099814a6c51c075bfd349
-
SHA512
c1db0d56c936a079b80cabfbbaec3fc042dea6b765283cb1481193dc05dc55ca313b71d1847935c741672d7bb63e9acef2bbbead4b5b9c5c389c6191ae71f080
-
SSDEEP
12288:PLMEalqxXblqoRX5qbfphLxaOS3CPqv0Ra6CgLc4rvGSlEkK3dHsZix:DqaXNabfphLxaVSPqvca6COBlaldx
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-