Behavioral task
behavioral1
Sample
Archie Executor/Akaza Executor.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Archie Executor/Akaza Executor.exe
Resource
win10v2004-20241007-en
General
-
Target
Akaza Executor.zip
-
Size
28KB
-
MD5
ee3c712089102f9481533c7a87c73a2d
-
SHA1
1c029891e45b78894248a70218fe8e3414615d2c
-
SHA256
c8f8c3931dfe7aaf4317129997d334a66ce63831ffba734646b2fac665f73aec
-
SHA512
703fa7a1e633f0458361d08fa493019c39ed924e0ee100c35b1553c00fcba7eeaf4eada9044e177eaa4be2a85b8fbef8c1e08a3d316ad9126eaff7ec1a819269
-
SSDEEP
768:BgZMqAosIQkA9NEoCjfzJ+5RrvTu6HoVwnPQ8aun3:895YCjLJYICD3
Malware Config
Extracted
discordrat
-
discord_token
MTMzMDk4MTIyODExMDY3NTk5OA.GtjQhg.JmWSRpTczxrX_1A9KdscxQg9DQjJe5yb8Kg4iU
-
server_id
1330981226093346919
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Archie Executor/Akaza Executor.exe
Files
-
Akaza Executor.zip.zip
-
Archie Executor/Akaza Executor.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ