General
-
Target
CODEX17.exe
-
Size
307KB
-
Sample
241211-rjq3tswkbz
-
MD5
53cc7337eed07bbbe0172f0b64bc6245
-
SHA1
9b0ac7e0eaffdb6ed8af1501939f40bd798f6be0
-
SHA256
1e5a4524dab6f1e4125043a7cdcfb6874c32a0514941ec4a90211f53efeef058
-
SHA512
ff2ec069d7877fdc646dfaaba4d9525ef71c04c93936accdd1bc1bfe9ab873ab27cceb9c2d34d25f3b3e6d4e6bb4ece707b797d2f5672d73583e21a361fb333d
-
SSDEEP
6144:m2EUicOFEG3AFDmDbpM6/XETGNNjyhRJNJC32XENQ8NvN:m2rOXTfpNg+
Static task
static1
Behavioral task
behavioral1
Sample
CODEX17.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMwODQxMjQ0MjIyODk1MzIwMA.GV9W16.iYVXo71VO-dFm-6aOmZjrpuYUGqFHWVGtkvM5Q
-
server_id
1316071968298111026
Targets
-
-
Target
CODEX17.exe
-
Size
307KB
-
MD5
53cc7337eed07bbbe0172f0b64bc6245
-
SHA1
9b0ac7e0eaffdb6ed8af1501939f40bd798f6be0
-
SHA256
1e5a4524dab6f1e4125043a7cdcfb6874c32a0514941ec4a90211f53efeef058
-
SHA512
ff2ec069d7877fdc646dfaaba4d9525ef71c04c93936accdd1bc1bfe9ab873ab27cceb9c2d34d25f3b3e6d4e6bb4ece707b797d2f5672d73583e21a361fb333d
-
SSDEEP
6144:m2EUicOFEG3AFDmDbpM6/XETGNNjyhRJNJC32XENQ8NvN:m2rOXTfpNg+
-
Discordrat family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-