General

  • Target

    https://cdn.discordapp.com/attachments/1299024239378038804/1307478044289667072/Auth.dll?ex=6767ef11&is=67669d91&hm=00fb2c172b3d03507b9ffd336b129f08a50aa6dc8064861e67024ff99cd44468&

  • Sample

    241222-alkv6avpdw

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1299024239378038804/1307478044289667072/Auth.dll?ex=6767ef11&is=67669d91&hm=00fb2c172b3d03507b9ffd336b129f08a50aa6dc8064861e67024ff99cd44468&

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks