General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1299024239378038804/1307478044289667072/Auth.dll?ex=6767ef11&is=67669d91&hm=00fb2c172b3d03507b9ffd336b129f08a50aa6dc8064861e67024ff99cd44468&
Resource
win10v2004-20241007-en
21 signatures
900 seconds
Malware Config
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1299024239378038804/1307478044289667072/Auth.dll?ex=6767ef11&is=67669d91&hm=00fb2c172b3d03507b9ffd336b129f08a50aa6dc8064861e67024ff99cd44468&
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Legitimate hosting services abused for malware hosting/C2
-