General

  • Target

    Akaza Executor.zip

  • Size

    28KB

  • Sample

    250121-vsktysvlcn

  • MD5

    ee3c712089102f9481533c7a87c73a2d

  • SHA1

    1c029891e45b78894248a70218fe8e3414615d2c

  • SHA256

    c8f8c3931dfe7aaf4317129997d334a66ce63831ffba734646b2fac665f73aec

  • SHA512

    703fa7a1e633f0458361d08fa493019c39ed924e0ee100c35b1553c00fcba7eeaf4eada9044e177eaa4be2a85b8fbef8c1e08a3d316ad9126eaff7ec1a819269

  • SSDEEP

    768:BgZMqAosIQkA9NEoCjfzJ+5RrvTu6HoVwnPQ8aun3:895YCjLJYICD3

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzMDk4MTIyODExMDY3NTk5OA.GtjQhg.JmWSRpTczxrX_1A9KdscxQg9DQjJe5yb8Kg4iU

  • server_id

    1330981226093346919

Targets

    • Target

      Archie Executor/Akaza Executor.exe

    • Size

      78KB

    • MD5

      1122dc03fd80494144a56982d0ed162a

    • SHA1

      891215f3b9aca2b6b4c683e04061e6cd1e54346e

    • SHA256

      94dd471caec018c37563c6ab44d84b831e8d6681096f05920091233562badae6

    • SHA512

      865c6263e62b730b86eabc6fba2b07a6b9fb7a27305baafadda7c07888964dc43fa79327d905295ce2a03d6789348a6b6c3579aaf12c8ff99040388f215c509c

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+YPIC:5Zv5PDwbjNrmAE+8IC

MITRE ATT&CK Enterprise v15

Tasks