General

  • Target

    Discord.exe

  • Size

    7.7MB

  • Sample

    250119-1e6r6axjex

  • MD5

    29f1b0d06ae87e4d2bc114048beff8db

  • SHA1

    a2713988a22ba0b3efc23c113b1f43dd2a006c5e

  • SHA256

    1f7d8094a388fbb2ebcf2c7bcac0269bb7f71f689ece97e88955487caa3aad9e

  • SHA512

    4731e88bc1b6f6139b722d6023a19d43b112d6e5e01eabae78decf944792e4aa05622ed95867b60fe11a3a5441c36a330c3c40289febd1c67d47c6cf1332962d

  • SSDEEP

    196608:3h0tSZ0eNTfm/pf+xk4d7nZRimrbW3jmyA:QCy/pWu4lZRimrbmyD

Malware Config

Targets

    • Target

      Discord.exe

    • Size

      7.7MB

    • MD5

      29f1b0d06ae87e4d2bc114048beff8db

    • SHA1

      a2713988a22ba0b3efc23c113b1f43dd2a006c5e

    • SHA256

      1f7d8094a388fbb2ebcf2c7bcac0269bb7f71f689ece97e88955487caa3aad9e

    • SHA512

      4731e88bc1b6f6139b722d6023a19d43b112d6e5e01eabae78decf944792e4aa05622ed95867b60fe11a3a5441c36a330c3c40289febd1c67d47c6cf1332962d

    • SSDEEP

      196608:3h0tSZ0eNTfm/pf+xk4d7nZRimrbW3jmyA:QCy/pWu4lZRimrbmyD

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks