General
-
Target
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f
-
Size
883KB
-
Sample
241128-a92htaxrhz
-
MD5
cfb50900d157c73a0c99bf8ae447d957
-
SHA1
8e41ff604483cf2e9076a0efd761024ac3f66831
-
SHA256
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f
-
SHA512
ccbd36c7074712f2e7529d7e9ce0aaa4b496c6284fc5a1c35cda15c799d9db2b8064fbe7db1aae234db18687a0e9b1b08bdfc93555a5fdab4c814e7533e65143
-
SSDEEP
24576:FGHCm8uPdJy+x3eo7kUewGIeAfjFb5p/+d:suWjetUPGPAH0
Static task
static1
Behavioral task
behavioral1
Sample
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMxMTQ0NDk4MTAxMzAyMDc3Mg.Gz_2To.ddyZMlskW5IkWxvZKQxtRRzfz4cgw2XjE4yAu0
-
server_id
1311378795281776650
Targets
-
-
Target
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f
-
Size
883KB
-
MD5
cfb50900d157c73a0c99bf8ae447d957
-
SHA1
8e41ff604483cf2e9076a0efd761024ac3f66831
-
SHA256
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f
-
SHA512
ccbd36c7074712f2e7529d7e9ce0aaa4b496c6284fc5a1c35cda15c799d9db2b8064fbe7db1aae234db18687a0e9b1b08bdfc93555a5fdab4c814e7533e65143
-
SSDEEP
24576:FGHCm8uPdJy+x3eo7kUewGIeAfjFb5p/+d:suWjetUPGPAH0
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-