General
-
Target
HardAC.zip
-
Size
81KB
-
Sample
241123-ptnz4s1mek
-
MD5
db6360e86bbf2d6ca18464eace469858
-
SHA1
385e5ca80847a44be6a2a6d6eecf64d083adda09
-
SHA256
4b3249c78c50f2f2cdb9befa5a8a0c6f1060f617d4baa0602e8bff3bb91c8cc8
-
SHA512
42ded51feaa85a8bfc280a21d5b431e5b81feb995ea25beb8f7f27ee9e877308ee1a95dbd005f0a5f2604e5091eff1d680aceed8a9feefc49643363859e003ee
-
SSDEEP
1536:049d1sGPIHQAPNJo4MKp4QLxgrZC7xgPO7T+EtkuaUbbNcGtOsZ4S0ux7qMf4H+e:0efbhWgBKew44xgItkuaUNc1sZvp7L4t
Static task
static1
Behavioral task
behavioral1
Sample
net6.0/HardAntiCheat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
net6.0/HardAntiCheat.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
net6.0/HardAntiCheat.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
net6.0/HardAntiCheat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
net6.0/HardAntiCheat.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
net6.0/HardAntiCheat.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTYxMDc0MTgzNzU5NDcwNQ.GjVcMg.PxEOfc7OAMHHzxt0OgOgfExaZIarA9jXdHoqTI
-
server_id
1309598138776162314
Targets
-
-
Target
net6.0/HardAntiCheat.dll
-
Size
12KB
-
MD5
b9084c75b8f23417df3547382d4858e7
-
SHA1
9e0b6ec5af327412477cb284d423627754225d86
-
SHA256
cb9187f9f551418ea5dacb2d977d12620709e33ecba3a6a0e9b181671bcf689a
-
SHA512
9ba58ba8b406272e42bd53f85b165a79097af86d8fb18c23200cf5b7cc4db68a17643085775a7897fe7a5d40f0d950e240d37fc5815713d60b6642323e33c54f
-
SSDEEP
384:yUSuX00UkRDIloKgab+ZVuTw5g+QL+c/:pbObgW/
Score1/10 -
-
-
Target
net6.0/HardAntiCheat.exe
-
Size
147KB
-
MD5
26cbc4c30f31bf1f3038edab23ebb203
-
SHA1
def825211a357f4a195c45e469edc7d52a713b09
-
SHA256
d47c9ed0a5f0ddce20c786251eedfe119e929f6c9d9aaf835fc3f472b8e4a724
-
SHA512
7c960d654473c66efe0e66f73a6ff9177eccdbeb6baeda6b56cc34b4630db4bf5f90ac3c08f875ddda646e64d4822e8eadaf487ea2dc497d1fffb075532805a6
-
SSDEEP
3072:K5vnr5Tbx829UOeKnn2LFzZBp13u36wKp4FULCzo1:KBKjK2LFzZNf+UL2
Score10/10-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-