General
-
Target
clandgpj.exe
-
Size
359KB
-
Sample
250104-1tmylayrct
-
MD5
4271c70a9cc171b2159e2cf06404eae7
-
SHA1
09e8fea1127994cc8269db868c5283c2f8c372ca
-
SHA256
b19d42d7c56f6afc2957ef90d84c0d24e70262c01c56e71416eac4b6de9bb51d
-
SHA512
60deb2318113ef34d1ed6b47ce3cc393b10372cc6a482bc08dd7080d7670a59d5c1c4c2390057e62e21824259416a3ebe2a90464790a71179fb1d28e82c2f489
-
SSDEEP
6144:1E+yclwQKjdn+WPtYVJIoBfYXUSJSdDQnjrEKBjknH:1BdlwHRn+WlYV+5XEEjrFanH
Static task
static1
Behavioral task
behavioral1
Sample
clandgpj.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
clandgpj.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNTE5ODU0ODEzMTc3NDQ3Ng.GGRvhn.0qO67JAYST6HRPMc7lzevXCuXAE2Hm6rkUlTQk
-
server_id
1099685979608068217
Targets
-
-
Target
clandgpj.exe
-
Size
359KB
-
MD5
4271c70a9cc171b2159e2cf06404eae7
-
SHA1
09e8fea1127994cc8269db868c5283c2f8c372ca
-
SHA256
b19d42d7c56f6afc2957ef90d84c0d24e70262c01c56e71416eac4b6de9bb51d
-
SHA512
60deb2318113ef34d1ed6b47ce3cc393b10372cc6a482bc08dd7080d7670a59d5c1c4c2390057e62e21824259416a3ebe2a90464790a71179fb1d28e82c2f489
-
SSDEEP
6144:1E+yclwQKjdn+WPtYVJIoBfYXUSJSdDQnjrEKBjknH:1BdlwHRn+WlYV+5XEEjrFanH
-
Discordrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-