General
-
Target
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e
-
Size
748KB
-
Sample
250102-b85draypdm
-
MD5
4a50c0fac7e7c8c8bab89a1968d24927
-
SHA1
8315b29f960059621c67b06ce85d8390df61ae53
-
SHA256
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e
-
SHA512
d6916f0a844ba8301a24b602411d859e44dedac5077c589fe9ae205f52dddb40b49bced20d3de41abf4a9a979b6171ee1f6b1318b811e460ec615fe2fd875d8f
-
SSDEEP
12288:8yveQB/fTHIGaPkKEYzURNAwbAg8f0VXGxnB/OBBh+HqXkGDQv88:8uDXTIGaPhEYzUzA0q6XGxZOBlHQv88
Static task
static1
Behavioral task
behavioral1
Sample
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyMzk1NDMyMzI3Mjc2NTQ1MA.GlwOtb.MRk2b9stGIOHJ31nrWHUdCWhTi5zASWKSorIOk
-
server_id
1323954995678417017
Targets
-
-
Target
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e
-
Size
748KB
-
MD5
4a50c0fac7e7c8c8bab89a1968d24927
-
SHA1
8315b29f960059621c67b06ce85d8390df61ae53
-
SHA256
abaee704f5c196371eb8b92f161135f5d42d9290c92e2ceb1e7dee10a0d15a4e
-
SHA512
d6916f0a844ba8301a24b602411d859e44dedac5077c589fe9ae205f52dddb40b49bced20d3de41abf4a9a979b6171ee1f6b1318b811e460ec615fe2fd875d8f
-
SSDEEP
12288:8yveQB/fTHIGaPkKEYzURNAwbAg8f0VXGxnB/OBBh+HqXkGDQv88:8uDXTIGaPhEYzUzA0q6XGxZOBlHQv88
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-