General
-
Target
pepe.jpg
-
Size
9KB
-
Sample
250102-mwm5gsylbw
-
MD5
75494425adf92da992dc799a556f65ea
-
SHA1
03a82524d97f766d2cd7305e45566e560197a512
-
SHA256
463a64d183f90599991de74c1b48330ad796fcd7aa733ac1a9be131eaa80618c
-
SHA512
20ddaec720ba304b644a010bfb3676fe13f64d9e7099e333051e5db43e2563d983fab29565e5f7902b017217ff450f5ce9ad68f2fa155ec780bbdd2914a117f7
-
SSDEEP
192:PT5eLK+PqoNaK7HrML4vT4ZkGorW+1ewk108rCqbWOqQlW:PlCBbw2xrWkb8rCqKqW
Static task
static1
Behavioral task
behavioral1
Sample
pepe.jpg
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyMzc2MTI5NjA3MTU5NDEyNg.G0ASX3.LfapSCo6skLNItfgDwfo6n_Irw9dpx2tIPS30I
-
server_id
1322790854867292273
Targets
-
-
Target
pepe.jpg
-
Size
9KB
-
MD5
75494425adf92da992dc799a556f65ea
-
SHA1
03a82524d97f766d2cd7305e45566e560197a512
-
SHA256
463a64d183f90599991de74c1b48330ad796fcd7aa733ac1a9be131eaa80618c
-
SHA512
20ddaec720ba304b644a010bfb3676fe13f64d9e7099e333051e5db43e2563d983fab29565e5f7902b017217ff450f5ce9ad68f2fa155ec780bbdd2914a117f7
-
SSDEEP
192:PT5eLK+PqoNaK7HrML4vT4ZkGorW+1ewk108rCqbWOqQlW:PlCBbw2xrWkb8rCqKqW
-
Discordrat family
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-