General
-
Target
virus.rar
-
Size
16.1MB
-
Sample
250101-e3m43axlal
-
MD5
1f1227c4f5adbd1bbd0da542d65cb9bd
-
SHA1
391ec5b53a1010dbddbef355fb3908f9f397e644
-
SHA256
2ecbb7bc7319ecdcb2d9d4bbf38deabd2a3a93999e02f595d9413bb4b9767171
-
SHA512
44ded61a2fd0ca3c3b053fe494c2814e9040ee764ab9787339f8d24950ddeb47323d3b9dfe51d3732b79fe9279de950b8059f0cb020d94898442c043e45da945
-
SSDEEP
393216:jUWz9Iz3I9sGLyR5No1JOPww0rZ0jJ7ksBQwdr381J+TEhVDtaxpr5:84ZmnmwwwjzQwdHjH9
Behavioral task
behavioral1
Sample
virus/Virus.exe
Resource
win10v2004-20241007-fr
Behavioral task
behavioral2
Sample
virus/resources/Discord.exe
Resource
win10v2004-20241007-fr
Behavioral task
behavioral3
Sample
virus/resources/Gen.exe
Resource
win10v2004-20241007-fr
Behavioral task
behavioral4
Sample
virus/resources/nitro.py
Resource
win10v2004-20241007-fr
Malware Config
Extracted
discordrat
-
discord_token
MTMyMzg2NTkxNDI4NjAxODY2NQ.GWEzhT.LfNT1TRxrNi0wH4g7-xuQFdnyioFM2jNkyqNMk
-
server_id
1323845201596387451
Targets
-
-
Target
virus/Virus.exe
-
Size
431KB
-
MD5
59830c5bd23ee9a6731ab53357bae10c
-
SHA1
686d8930f5fd18a9b94a196fab728995d4f0a23c
-
SHA256
562da82431e0531463bd5ae23c4f52a74f8c279a3f172ea803b589f4259a904d
-
SHA512
63be6b7ff9486438e7a8e51ce7154a7d44ba51d324818a571fe06f5c8c1375129afe9851051148f466e00e704c1a950dc1a60a94c3506fb5caf98a44f0aa94ef
-
SSDEEP
6144:pc9yzJpeQF2ZcbTzHznY8XHyldgaPGr++7+EK/zJDi3RC4AQNMIoYrmLUMn5k:4yveQB/fTHIGaPkKEYzURNAwbAgMn5k
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Boot or Logon Autostart Execution: Print Processors
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of SetThreadContext
-
-
-
Target
virus/resources/Discord.exe
-
Size
78KB
-
MD5
4a65257ccc7cc5c6440dcefe5ad4523f
-
SHA1
0ee7ba38ed1f16cf4aaea11edb64e8275d674c10
-
SHA256
e82cec44f57277f6172f89f7107b46754e5d0f3aed3ce61c8dac13b258218dcf
-
SHA512
23839a073fcd6872edd105c7f8a8baca7dfa7c25f6f8c4e3e0c3f9da37862493c80825a5582c338d89fc08e35bc1fe9941b49cb7731b24f607e0fb06504b7449
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ZPIC:5Zv5PDwbjNrmAE+pIC
-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
virus/resources/Gen.exe
-
Size
37.3MB
-
MD5
d42259a00c855fd74a801ba985c8c461
-
SHA1
cd197e5db4eda2d7fc2e5836ac6e2d783bf2d95c
-
SHA256
ef03f85be4432bf02d4f2c51d06ad58fd0c3cbb6d56aa21219f922ac985da564
-
SHA512
6f2d47ac0043abd9a44795ca8a195cfafa2ac274afb7bd4daf4dfaf30fd612a5c971fd5e409d89315319920efaedd723dbfc2d091aac57c2f99509947f3d171a
-
SSDEEP
393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mgH96l+ZArYsFRlUPb:R3on1HvSzxAMNHFZArYscPvzP7OZu
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
-
-
Target
virus/resources/nitro.py
-
Size
344B
-
MD5
c8da61d14ba6f678299a245425342120
-
SHA1
02c2eac1ac13a41e9e228ed208699e18ed78df65
-
SHA256
c20d3ef3f674052b2782d3db3e6173bdb2d962f769dca3243f18bd4db6d01096
-
SHA512
359ccf0702403394dabc6d5c5b5c18293ff32bac4bab8572dbab824b68ef3ba8be89c392f3c2ab522d1b53b648e911733c9e77951bc282dfa3037576b940869c
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Print Processors
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Print Processors
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Indicator Removal
2Clear Windows Event Logs
1File Deletion
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1