Resubmissions
25-11-2024 01:15
241125-bmg2bszpav 10Behavioral task
behavioral1
Sample
Woomp.exe
Resource
win11-20241007-en
General
-
Target
Woomp.exe
-
Size
78KB
-
MD5
45a48ca77edd6fcb75e6086d44afac76
-
SHA1
87aa042d3b052982e390768af1f9171c8c6249c1
-
SHA256
74eb1588f759f2506b59257caf40a51946c3de7115aaa07ecc0c398c30ebb327
-
SHA512
1e7066274cb066008c989f3478b735fa238c094ccaec661345fc113db5cea92b79f778d9882d9b4249d76eebce5a9fef5fc27fe554d6092836a573af7599db11
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxMDQxMTgxODEyMzkxOTQ4Mw.GwacT0.PAQkuzftriLM7RlTUiPVz9Ef_tbR89UCutRUvM
-
server_id
1310412901319708682
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Woomp.exe
Files
-
Woomp.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ