General
-
Target
home
-
Size
51KB
-
Sample
250101-zp8h3atncx
-
MD5
c05f8101788ba9d2b1bccb030bf3aaea
-
SHA1
bc8ca9aebf099a85ad40115706556aa7f14e97b8
-
SHA256
d4de979321fdd1346ca9b9b837edd4f88ff94da69d61f08babc33c60f602e144
-
SHA512
73e5ba21321be3404358e491a98737c5e7b9865b5ec38dac90e876f3d6a7a2f9df245430dfe5117af8ec0a276318dad86fd918a264ceb26ecf8a582a18b09f83
-
SSDEEP
768:88kNWKwvxAESwezl8kNWP8AqjkbTMyUcY0dYzfn8b5:886WK1/86WBqjkbTMLidAf8b5
Static task
static1
Behavioral task
behavioral1
Sample
home.html
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNDExODIwNDM4MTEzNDkwMA.GraJ7V.xNuemyWdlO3nJTqa9oT0mOOFHljD0SQUtIWe_Q
-
server_id
1324118276779016263
Targets
-
-
Target
home
-
Size
51KB
-
MD5
c05f8101788ba9d2b1bccb030bf3aaea
-
SHA1
bc8ca9aebf099a85ad40115706556aa7f14e97b8
-
SHA256
d4de979321fdd1346ca9b9b837edd4f88ff94da69d61f08babc33c60f602e144
-
SHA512
73e5ba21321be3404358e491a98737c5e7b9865b5ec38dac90e876f3d6a7a2f9df245430dfe5117af8ec0a276318dad86fd918a264ceb26ecf8a582a18b09f83
-
SSDEEP
768:88kNWKwvxAESwezl8kNWP8AqjkbTMyUcY0dYzfn8b5:886WK1/86WBqjkbTMLidAf8b5
-
Discordrat family
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-