General
-
Target
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721
-
Size
801KB
-
Sample
241228-zgm76aslfq
-
MD5
7a876eea8b960edd0dd76c20f2ac80e0
-
SHA1
e4368e08b6f72bf76426f16b446a7ca7cd60f753
-
SHA256
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721
-
SHA512
300a74ffbe5c1cdf1f83c9396f72c2a36975338bd40a520a3421dc6325adf865d4bb9d0e75f29d6162e38e054287a0a9e3e61c0684193d9449cc86eddf9d4f54
-
SSDEEP
12288:oCQjgAtAHM+vetZxF5EWry8AJGy0qxAzv4sPaMdQ/S80ZS20:o5ZWs+OZVEWry8AFrAb4sPBQEY20
Static task
static1
Behavioral task
behavioral1
Sample
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
OTUzNjY2MTA0NzE3MzY5MzQ0.GO4i8C.zDJ7JBYIXSLXHlJi5Yi6jwoHSErKVO_IQHRGWw
-
server_id
954371492722933781
Targets
-
-
Target
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721
-
Size
801KB
-
MD5
7a876eea8b960edd0dd76c20f2ac80e0
-
SHA1
e4368e08b6f72bf76426f16b446a7ca7cd60f753
-
SHA256
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721
-
SHA512
300a74ffbe5c1cdf1f83c9396f72c2a36975338bd40a520a3421dc6325adf865d4bb9d0e75f29d6162e38e054287a0a9e3e61c0684193d9449cc86eddf9d4f54
-
SSDEEP
12288:oCQjgAtAHM+vetZxF5EWry8AJGy0qxAzv4sPaMdQ/S80ZS20:o5ZWs+OZVEWry8AFrAb4sPBQEY20
Score10/10-
Discordrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-