General
-
Target
DISCORD NUKER BY KLOWZYY.exe
-
Size
19.5MB
-
Sample
241230-1bxp3szkaq
-
MD5
3b74622cb80575e2fd54acce44b7e133
-
SHA1
9890e867697ae8fd5e35543c3ac257cf03065606
-
SHA256
39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c
-
SHA512
46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6
-
SSDEEP
393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od
Behavioral task
behavioral1
Sample
DISCORD NUKER BY KLOWZYY.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DISCORD NUKER BY KLOWZYY.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
DISCORD NUKER BY KLOWZYY.exe
-
Size
19.5MB
-
MD5
3b74622cb80575e2fd54acce44b7e133
-
SHA1
9890e867697ae8fd5e35543c3ac257cf03065606
-
SHA256
39c4afc796f6730ec8da841d1aec05f2c3e87424952f6e85049a98f66edea31c
-
SHA512
46e8a33ca55d3e10b95054fad61e3ef0ae21c68932e115c45c16d6126d88a9e6cbc8e2701d7f37e11815671427abb863137ce5b3909534c1a04260b2a987bca6
-
SSDEEP
393216:hqPnLFXlrFrpQQ6DOETgsvfGYgDGAvmkCbaBIIOdWgk:IPLFXNFrpQQrEROTn/Od
-
A potential corporate email address has been identified in the URL: [email protected]
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
c26ca850b8027b5e4e28a7000145afba
-
SHA1
1c3dca23fb11230d0f7dae9bd3d5a4852f409d06
-
SHA256
9d2e1266a391fe12a9790d3d2a9f7835ed06f7f50323199c8e3cb19a6f5c8969
-
SHA512
00a8ee251199d238fba3ac529b0e1c53ec6e63e135a01d1181b312efd3cd69492c5f6acd69ef89cb6abc621e7eae3f86324f06772a535aa096af7f09f410e45c
-
SSDEEP
192:wzcA2D848O1WdXwJ1G33Fi5JhwDk/MdwIxnw:jsyWuJ5z2cPIxw
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1