General
-
Target
Sigma1231231.exe
-
Size
78KB
-
Sample
241227-bf3z8axmgp
-
MD5
8883fa8d238242e1aa27ffa53978f471
-
SHA1
e1b7cf625a7efeaef1267d7526ce0d8934cbd1d5
-
SHA256
79b60dc0e09c34c25572e03fd159abc274611b764a114225b56ffd7493f3d194
-
SHA512
767dc16b9f9815e39cf50b897e76ead19036c02ac56a874331c75e39ac0c6396bc749a876a155462dd9919521aac069a29f55fa8a0b4f61ac926b62fc481802a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+sPIC:5Zv5PDwbjNrmAE+AIC
Behavioral task
behavioral1
Sample
Sigma1231231.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyMTgzMTIwOTA5MjkwNzAzMA.GSuLMP.Q2rECgIO-z6aoG3zAks69t5l-n64ffenYfOjCM
-
server_id
1160586840504545422
Targets
-
-
Target
Sigma1231231.exe
-
Size
78KB
-
MD5
8883fa8d238242e1aa27ffa53978f471
-
SHA1
e1b7cf625a7efeaef1267d7526ce0d8934cbd1d5
-
SHA256
79b60dc0e09c34c25572e03fd159abc274611b764a114225b56ffd7493f3d194
-
SHA512
767dc16b9f9815e39cf50b897e76ead19036c02ac56a874331c75e39ac0c6396bc749a876a155462dd9919521aac069a29f55fa8a0b4f61ac926b62fc481802a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+sPIC:5Zv5PDwbjNrmAE+AIC
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-