General
-
Target
OjJUHZqY
-
Size
2KB
-
Sample
250120-wx25gasmcv
-
MD5
f1bf7634d402c200749c2e7cf9ea5a8f
-
SHA1
56b6dff171bdda0849090254c5fc93309fd95d4e
-
SHA256
cdb078b82903d83163bf975613a8006226d21a03a2d1b8eea4b9285ce67544aa
-
SHA512
28a8964ea22982a83e7af00d147bca665e441b3a595e3126517dd8c04d3716b94e0d429451c938e346955026d41132a1e626e721fb2b4b6c2147f03444f826b9
Static task
static1
Behavioral task
behavioral1
Sample
OjJUHZqY.html
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMDU3MDM3MDMzNTY0MTY0MA.Gac_DS.HeVHzigazhAbTSurvP_yMNkYqokjSmMw_upwMA
-
server_id
1330570620114698341
Targets
-
-
Target
OjJUHZqY
-
Size
2KB
-
MD5
f1bf7634d402c200749c2e7cf9ea5a8f
-
SHA1
56b6dff171bdda0849090254c5fc93309fd95d4e
-
SHA256
cdb078b82903d83163bf975613a8006226d21a03a2d1b8eea4b9285ce67544aa
-
SHA512
28a8964ea22982a83e7af00d147bca665e441b3a595e3126517dd8c04d3716b94e0d429451c938e346955026d41132a1e626e721fb2b4b6c2147f03444f826b9
Score10/10-
Discordrat family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-