General
-
Target
bootstrapper.exe
-
Size
78KB
-
Sample
250112-k3afvsykaj
-
MD5
bbcd1358829e3f227e2994cee4104a07
-
SHA1
ea5e32e8b9b2af737009cb6f80b6729b748fdfab
-
SHA256
92fce7a02eb2bcaa35ea632e9eb8534f44b0eb2839e94b7f80c91251fff5d251
-
SHA512
66af0ec9ba3d641ed50dd283fa61d5186824504d0779a6036300f4ecc24a6afc7e8143b1afd777d467b367cebe3258aab889cd317eba7cd21e5145ef5d90895c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+1PIC:5Zv5PDwbjNrmAE+lIC
Behavioral task
behavioral1
Sample
bootstrapper.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyNzkyMjgxNzUzODQ1NzY0MQ.GHccHA.ZdFmK2NR5y0hOF4icu1bgrMPm9-_Z95-15yAFc
-
server_id
1325467073790345276
Targets
-
-
Target
bootstrapper.exe
-
Size
78KB
-
MD5
bbcd1358829e3f227e2994cee4104a07
-
SHA1
ea5e32e8b9b2af737009cb6f80b6729b748fdfab
-
SHA256
92fce7a02eb2bcaa35ea632e9eb8534f44b0eb2839e94b7f80c91251fff5d251
-
SHA512
66af0ec9ba3d641ed50dd283fa61d5186824504d0779a6036300f4ecc24a6afc7e8143b1afd777d467b367cebe3258aab889cd317eba7cd21e5145ef5d90895c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+1PIC:5Zv5PDwbjNrmAE+lIC
-
Discordrat family
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-