Resubmissions
09-12-2024 20:50
241209-zmkzzswkcl 10General
-
Target
https://mega.nz/file/0PNWSZqZ#UjgxJ1-tr1_7eqpE73tUD3kNN2RnS4SrnKVaYdSIE-Q
-
Sample
241209-zmkzzswkcl
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/0PNWSZqZ#UjgxJ1-tr1_7eqpE73tUD3kNN2RnS4SrnKVaYdSIE-Q
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
20 signatures
150 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNTc3MjYwNDIyODk2NDU1NA.GLJDUi.35OkPShLzZToHO_MZL3sqv284uCFrDue754vyU
-
server_id
1315656350730162187
Targets
-
-
Target
https://mega.nz/file/0PNWSZqZ#UjgxJ1-tr1_7eqpE73tUD3kNN2RnS4SrnKVaYdSIE-Q
-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-