General

  • Target

    DISCORD NUKER BY KLOWZYY.exe

  • Size

    19.5MB

  • Sample

    241201-q58dkasqaz

  • MD5

    3b74622cb80575e2fd54acce44b7e133

  • SHA1

    9890e867697ae8fd5e35543c3ac257cf03065606

  • SHA256

    39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c

  • SHA512

    46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6

  • SSDEEP

    393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od

Malware Config

Targets

    • Target

      DISCORD NUKER BY KLOWZYY.exe

    • Size

      19.5MB

    • MD5

      3b74622cb80575e2fd54acce44b7e133

    • SHA1

      9890e867697ae8fd5e35543c3ac257cf03065606

    • SHA256

      39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c

    • SHA512

      46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6

    • SSDEEP

      393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks