General
-
Target
pass_barrotes.zip
-
Size
28KB
-
Sample
241214-rt43fawqfm
-
MD5
0e80f8c06cbad96ff9efab069c0ffcb8
-
SHA1
c1aae69235526933444ac0b82007f8e9c6c0f835
-
SHA256
a9db5789f45cd9f605968531d33c01990f6822f1b8ba966332acd5e5f8f8e980
-
SHA512
1aa06b73c18bd65350cf7594b4922a01c6aa33f1fa509575611f5a9c98c1b231643c40695b5e336720d8ec6a07c0d20be5f15677a6fc85af62a5833800695dea
-
SSDEEP
384:Vc+laWpqmyF2ZV5i9oOTP4hAgzoWPqdbB5z76lPW7ui+d066jW9QqXCrwMjYUMbp:VcIoiVY9ocP4hAgUfBJ76TvxSr/EUu9L
Behavioral task
behavioral1
Sample
barrotes.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzE1MTMxMDMxMDY3NDQ1Mw.G4vdtT.2Xaw0SLq-8xqoRh1THgonbntua-rEIma7FhcgY
-
server_id
1317163923350487151
Targets
-
-
Target
barrotes.exe
-
Size
78KB
-
MD5
1adab14cec5319868d619041f47cfd76
-
SHA1
eea3c85e94ee8b7c4473fa51ff97731a7a590d80
-
SHA256
c9b3fcf43ef4bdae5f28d4469e810fc02e953eb540c593c8ca4bebe54cf43c10
-
SHA512
af7b95a1cb69d84a0a3b7ab26599c265b8f816ad6eb8d9cf135eff1daa76e77a5372393959a62f08a1002550459fede1662d2774d7ff41d1b5243c93b10623c6
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-