General
-
Target
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5
-
Size
520KB
-
Sample
241226-2l748stlex
-
MD5
7e26d878b40e1e18d7a8502adb7786ee
-
SHA1
6ec71f9b6b4ed98c6ad17598cebfd2dbb2002355
-
SHA256
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5
-
SHA512
c14613e37c3f7418ab289d92372677251d32663ac49d530d4f249014977e7d89dafd2f1b644dc2a4173d47e89e3b38d436da6a79425bcedb99736d7dee4d0ab6
-
SSDEEP
12288:EyveQB/fTHIGaPkKEYzURNAwbAg8jTYiGwbc:EuDXTIGaPhEYzUzA0qDGwbc
Static task
static1
Behavioral task
behavioral1
Sample
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyMTM0MDQzMjc0Mjg3OTI3Mw.GMUugK._6Rg19IMHnSVA-dlu-NIekKS1NnRtnrMEh3n08
-
server_id
1321339493286019134
Targets
-
-
Target
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5
-
Size
520KB
-
MD5
7e26d878b40e1e18d7a8502adb7786ee
-
SHA1
6ec71f9b6b4ed98c6ad17598cebfd2dbb2002355
-
SHA256
269a629068ef029d5432e001a3744fa87753a3c62dee5dd022e461f94f849ee5
-
SHA512
c14613e37c3f7418ab289d92372677251d32663ac49d530d4f249014977e7d89dafd2f1b644dc2a4173d47e89e3b38d436da6a79425bcedb99736d7dee4d0ab6
-
SSDEEP
12288:EyveQB/fTHIGaPkKEYzURNAwbAg8jTYiGwbc:EuDXTIGaPhEYzUzA0qDGwbc
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-