General
-
Target
chromegpj.exe
-
Size
372KB
-
Sample
241213-trgkgatngv
-
MD5
8cadd36be12b3cd44d9c50fc3008e394
-
SHA1
8fa3308090c3aee5f61da184655aea845b8761fe
-
SHA256
d621cd3aa3adc02c26daf4ffe4da673c4cad67a9d02cb6a0e43c278f8c290b07
-
SHA512
e07ad462c95c9bd59aaade09c9c1fb324026c4291bf57bbd657715dc3377d6ce2bf55ab52e7c334f7a42693774c24db2c46d3a5599c6dfa81c464a7149abff72
-
SSDEEP
3072:5n2Af+SLiJO+Y7mR9USl6yOiGB3PSQQivLXdn+mvo+vuChrZtwkYZBwOepe4PUe6:UE+yclwQKjdn+WPtYVJIoBfYgCiVII
Static task
static1
Behavioral task
behavioral1
Sample
chromegpj.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
chromegpj.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzE1MTMxMDMxMDY3NDQ1Mw.GKLp3H.CULEGtm2KgLqJoKC0S7wJsZGE2slaPIFOXFieM
-
server_id
1189257292844122132
Targets
-
-
Target
chromegpj.exe
-
Size
372KB
-
MD5
8cadd36be12b3cd44d9c50fc3008e394
-
SHA1
8fa3308090c3aee5f61da184655aea845b8761fe
-
SHA256
d621cd3aa3adc02c26daf4ffe4da673c4cad67a9d02cb6a0e43c278f8c290b07
-
SHA512
e07ad462c95c9bd59aaade09c9c1fb324026c4291bf57bbd657715dc3377d6ce2bf55ab52e7c334f7a42693774c24db2c46d3a5599c6dfa81c464a7149abff72
-
SSDEEP
3072:5n2Af+SLiJO+Y7mR9USl6yOiGB3PSQQivLXdn+mvo+vuChrZtwkYZBwOepe4PUe6:UE+yclwQKjdn+WPtYVJIoBfYgCiVII
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-