General
-
Target
settings.xml
-
Size
3KB
-
Sample
241203-v5nrda1nbp
-
MD5
f5466c60260c65e6b5b31104cb364ea5
-
SHA1
fabaabd4153c5bac3c2eb7942d1590ab46f923b8
-
SHA256
984fcd7ad0ccc5974c2944c8164ee365753bd64edac36cb9cbc5e46099c07555
-
SHA512
e2e73d7dbdd6e043dae5ad147d67701a2e64da7e987df0187221b2d1af616dfe594712d4733470adba3c4c802e9041a6c3fa0bb2406a7e4e8062662a0c6f7a09
Static task
static1
Behavioral task
behavioral1
Sample
settings.xml
Resource
win10v2004-20241007-en
Malware Config
Extracted
https://oooovchheayt3.github.io/Tools/Verification.html
Extracted
discordrat
-
discord_token
MTMxMzUwNTc1ODQ3MzYyMTUxNA.GEstRj.TKeczpDrTK0oQpy8R4VP1ZtwXAi2iFDXFb9V0Y
-
server_id
1252699178128375888
Targets
-
-
Target
settings.xml
-
Size
3KB
-
MD5
f5466c60260c65e6b5b31104cb364ea5
-
SHA1
fabaabd4153c5bac3c2eb7942d1590ab46f923b8
-
SHA256
984fcd7ad0ccc5974c2944c8164ee365753bd64edac36cb9cbc5e46099c07555
-
SHA512
e2e73d7dbdd6e043dae5ad147d67701a2e64da7e987df0187221b2d1af616dfe594712d4733470adba3c4c802e9041a6c3fa0bb2406a7e4e8062662a0c6f7a09
Score10/10-
Discordrat family
-
Blocklisted process makes network request
-