General
-
Target
Akaza Executor.zip
-
Size
28KB
-
Sample
250121-vsktysvlcn
-
MD5
ee3c712089102f9481533c7a87c73a2d
-
SHA1
1c029891e45b78894248a70218fe8e3414615d2c
-
SHA256
c8f8c3931dfe7aaf4317129997d334a66ce63831ffba734646b2fac665f73aec
-
SHA512
703fa7a1e633f0458361d08fa493019c39ed924e0ee100c35b1553c00fcba7eeaf4eada9044e177eaa4be2a85b8fbef8c1e08a3d316ad9126eaff7ec1a819269
-
SSDEEP
768:BgZMqAosIQkA9NEoCjfzJ+5RrvTu6HoVwnPQ8aun3:895YCjLJYICD3
Behavioral task
behavioral1
Sample
Archie Executor/Akaza Executor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Archie Executor/Akaza Executor.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMDk4MTIyODExMDY3NTk5OA.GtjQhg.JmWSRpTczxrX_1A9KdscxQg9DQjJe5yb8Kg4iU
-
server_id
1330981226093346919
Targets
-
-
Target
Archie Executor/Akaza Executor.exe
-
Size
78KB
-
MD5
1122dc03fd80494144a56982d0ed162a
-
SHA1
891215f3b9aca2b6b4c683e04061e6cd1e54346e
-
SHA256
94dd471caec018c37563c6ab44d84b831e8d6681096f05920091233562badae6
-
SHA512
865c6263e62b730b86eabc6fba2b07a6b9fb7a27305baafadda7c07888964dc43fa79327d905295ce2a03d6789348a6b6c3579aaf12c8ff99040388f215c509c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+YPIC:5Zv5PDwbjNrmAE+8IC
Score10/10-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2
-