General
-
Target
BeamWebhookDownload.rar
-
Size
26KB
-
Sample
250104-m5lb9awpev
-
MD5
885014cae48eea22bc4e10ad55eb7ff2
-
SHA1
66411c33bb0d12f7773b9dec00ddf0d012b4af61
-
SHA256
c1cdd25217e0107de1fc8c291e2331dbe21509273917969263e3f2d6317251bb
-
SHA512
bc2f8773e79e4c40616c6e75bb318ce90cd885135f0b56285eb07e1339ede147fa7cdf62d6548da9fbecef46d1704e4e91a6f1249c27350b5a182dc428384519
-
SSDEEP
768:SqgcA5CtmA2cd2FmhJGM0RAYckEe6Cqi3AOG:SNNcd2FWYtRY/Cqiwn
Behavioral task
behavioral1
Sample
Swift/Bootstrap/Swift Executor/SWIFT/Swift Executor/Swift Bootstrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Swift/Bootstrap/Swift Executor/SWIFT/Swift Executor/Swift Bootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNTAxMTIyOTk2NTY4MDcxMg.GVbtJu.NiHaLGAe8ngV52ERblctO7HS_Ax5yYvARm0euQ
-
server_id
1324735552167346220
Targets
-
-
Target
Swift/Bootstrap/Swift Executor/SWIFT/Swift Executor/Swift Bootstrapper.exe
-
Size
78KB
-
MD5
4d7aca5d5b871edfb68464834bfd0a30
-
SHA1
3760f55447efb2cb2bfb250ac5c639b1684c7238
-
SHA256
d005912875fed025544a38fd356ae7472df10979f023d82814db8bb667ea8bbe
-
SHA512
08484c8395775eee9f59624ce25837959e6c2e933c425e3a82446e661c765417235fcf24e288b53a33c413fe127917dfa0e0ad305b5b2c7807814fc81afda88e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Score10/10-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2
-