General
-
Target
2024-04-18 (1).png
-
Size
72KB
-
Sample
250111-eknymsspcw
-
MD5
c7314398f02327254acb7e28da24071f
-
SHA1
82f3595b8529d9aadd9e601ee35793365e03ac6d
-
SHA256
56bc0d0fbfe044b839f2bec38faeede98171d10ec8718fe8a15f954bc2b9b28c
-
SHA512
939b42bad3cfd9ae2ff91c4c8eee08f13ebb647ab81dd73013fd9027790fc02320183dad07496aaf5484b11f69d934ba57001b5d7165010758bef5d192920749
-
SSDEEP
1536:XmmmDjYCRzUgPq+DCt0LKt8hatqyQeUV9hOUy7d3iZs2mX9xKQ1S:C8CM2K2CqyQfV9hOUyZ3iZatxKj
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-18 (1).png
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNzQ4NzY5NjgxNzQ4Nzg3Ng.GGBFoi.PzRb6ZOhmTfsQzJUfXVjuc_Ntwa5EL7pbkcn9o
-
server_id
1327488017765630022
Targets
-
-
Target
2024-04-18 (1).png
-
Size
72KB
-
MD5
c7314398f02327254acb7e28da24071f
-
SHA1
82f3595b8529d9aadd9e601ee35793365e03ac6d
-
SHA256
56bc0d0fbfe044b839f2bec38faeede98171d10ec8718fe8a15f954bc2b9b28c
-
SHA512
939b42bad3cfd9ae2ff91c4c8eee08f13ebb647ab81dd73013fd9027790fc02320183dad07496aaf5484b11f69d934ba57001b5d7165010758bef5d192920749
-
SSDEEP
1536:XmmmDjYCRzUgPq+DCt0LKt8hatqyQeUV9hOUy7d3iZs2mX9xKQ1S:C8CM2K2CqyQfV9hOUyZ3iZatxKj
Score10/10-
Discordrat family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Probable phishing domain
-