General
-
Target
sonicgpj.exe
-
Size
517KB
-
Sample
250106-fdzx1awpdz
-
MD5
61fbc144acd42d18cbfc6120d4ca62d8
-
SHA1
ec8c85882a46b554abf6bc7772c0ef6725d6cc4f
-
SHA256
22ec463efcdbe25769d052b8c7efbc906308b4cb0c9b4a050e9f87d9d3c9603f
-
SHA512
5c327ede9b0536fe9bc3ca3da93533cc6ae2db51286daa66b75c05042593911c104a4a3a0525080a6be35b1fe224bb0f67ca79fdc82167b1a93c30d7c88c1692
-
SSDEEP
12288:2CQjgAtAHM+vetZxF5EWry8AJGy0y+qy8qyBqImFFQ:25ZWs+OZVEWry8AFBdy8jq5XQ
Static task
static1
Behavioral task
behavioral1
Sample
sonicgpj.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
sonicgpj.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTE3MDQzNjc1NDU1NDI0NTE4MA.GrJnns.JzVbnDDcfKhzDhFYb8KVjb0LIZJvOQ-Q9G9LCQ
-
server_id
1298154591732629564
Targets
-
-
Target
sonicgpj.exe
-
Size
517KB
-
MD5
61fbc144acd42d18cbfc6120d4ca62d8
-
SHA1
ec8c85882a46b554abf6bc7772c0ef6725d6cc4f
-
SHA256
22ec463efcdbe25769d052b8c7efbc906308b4cb0c9b4a050e9f87d9d3c9603f
-
SHA512
5c327ede9b0536fe9bc3ca3da93533cc6ae2db51286daa66b75c05042593911c104a4a3a0525080a6be35b1fe224bb0f67ca79fdc82167b1a93c30d7c88c1692
-
SSDEEP
12288:2CQjgAtAHM+vetZxF5EWry8AJGy0y+qy8qyBqImFFQ:25ZWs+OZVEWry8AFBdy8jq5XQ
-
Discordrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-