Overview
overview
10Static
static
10Discord-Ac...1).zip
windows7-x64
1Discord-Ac...1).zip
windows10-2004-x64
1Discord-Ac...DME.md
windows7-x64
3Discord-Ac...DME.md
windows10-2004-x64
3Discord-Ac...g.toml
windows7-x64
3Discord-Ac...g.toml
windows10-2004-x64
3Discord-Ac...ns.txt
windows7-x64
1Discord-Ac...ns.txt
windows10-2004-x64
1Discord-Ac...in.exe
windows7-x64
10Discord-Ac...in.exe
windows10-2004-x64
10Discord-Ac...src.py
windows7-x64
3Discord-Ac...src.py
windows10-2004-x64
3Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 14:17
Behavioral task
behavioral1
Sample
Discord-Account-Generator-main (1).zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Discord-Account-Generator-main (1).zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Discord-Account-Generator-main/README.md
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Discord-Account-Generator-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Discord-Account-Generator-main/config.toml
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Discord-Account-Generator-main/config.toml
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Discord-Account-Generator-main/generated_tokens.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Discord-Account-Generator-main/generated_tokens.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Discord-Account-Generator-main/main.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Discord-Account-Generator-main/main.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Discord-Account-Generator-main/src.py
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Discord-Account-Generator-main/src.py
Resource
win10v2004-20241007-en
General
-
Target
Discord-Account-Generator-main/src.py
-
Size
18KB
-
MD5
62943794fc12c82e22cccfba4fed4939
-
SHA1
5e56e9f3e240bf7f49f93ae312284b33ebd6f50f
-
SHA256
2313dcf0ef3bac0e1ec528b396b7aad090b815a3820021aeda1208e37d71d413
-
SHA512
f5fa024c3ccc3e15a048b88b16aeaf3fbe23d9201ebb36faa03e7ba94c8acabf7ed5adf45db83b1f67098608129d98267e09d8b5b21b7f049c285c95d656e8d4
-
SSDEEP
24:MffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffK:X
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1700 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Account-Generator-main\src.py1⤵
- Modifies registry class
PID:2040
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1700