General
-
Target
release.zip
-
Size
445KB
-
Sample
241130-zahzvsylcn
-
MD5
8dde06db117cfef8cb8dd92bcad80973
-
SHA1
505f0d3909f8eeabd65849cd1467b539f78e0397
-
SHA256
dcb31b4f27169702996ef9789d758288bb010c26501f6629455bd95dd53d9039
-
SHA512
826bf89d827bff48a28b9669f7d46c4ab0a06fcc3851aeab1ea07d0d65cff985071a820fdc0707048239a4760358071a3eea059c277bc0cf52d1a86ac4adc353
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQq:BKGo8EifSQwYWq
Behavioral task
behavioral1
Sample
release.zip
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
release.zip
-
Size
445KB
-
MD5
8dde06db117cfef8cb8dd92bcad80973
-
SHA1
505f0d3909f8eeabd65849cd1467b539f78e0397
-
SHA256
dcb31b4f27169702996ef9789d758288bb010c26501f6629455bd95dd53d9039
-
SHA512
826bf89d827bff48a28b9669f7d46c4ab0a06fcc3851aeab1ea07d0d65cff985071a820fdc0707048239a4760358071a3eea059c277bc0cf52d1a86ac4adc353
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQq:BKGo8EifSQwYWq
-
Discordrat family
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-