General
-
Target
DISCORDNUKERBYKLOWZYY.exe
-
Size
19.5MB
-
Sample
241201-q9tqzaxnfn
-
MD5
3b74622cb80575e2fd54acce44b7e133
-
SHA1
9890e867697ae8fd5e35543c3ac257cf03065606
-
SHA256
39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c
-
SHA512
46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6
-
SSDEEP
393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od
Behavioral task
behavioral1
Sample
DISCORDNUKERBYKLOWZYY.exe
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
DISCORDNUKERBYKLOWZYY.exe
-
Size
19.5MB
-
MD5
3b74622cb80575e2fd54acce44b7e133
-
SHA1
9890e867697ae8fd5e35543c3ac257cf03065606
-
SHA256
39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c
-
SHA512
46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6
-
SSDEEP
393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-