General
-
Target
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba
-
Size
278KB
-
Sample
250123-hngkhsxqd1
-
MD5
647f7c23154548a9db378c586a9a592d
-
SHA1
2ec68e4345f61c046707665222ba8f544ad15506
-
SHA256
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba
-
SHA512
8e62397249e5cc753333bc08f7dd72e7cebb2f196bd60cbe5d85ff277bc85436f785146cc38296e1430bf11f7effba3ea68b911a5e8ca120c0467b63216d6b44
-
SSDEEP
3072:F5L+TmkCC/6H7VAyZjFVA+Z89peccopp0pbpC5it2TMWeG:F5aVpeccopp0pbpuTMW9
Static task
static1
Behavioral task
behavioral1
Sample
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMDk2MzQyNTIzMjQyNTA5Mw.GGR2C3.2c1fbdjdBTKFuuehMq5J2B6hloWwpn1KByBAoo
-
server_id
1330576263034699828
Targets
-
-
Target
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba
-
Size
278KB
-
MD5
647f7c23154548a9db378c586a9a592d
-
SHA1
2ec68e4345f61c046707665222ba8f544ad15506
-
SHA256
c0165cd17b88713f3a696381b81395c2fa6b5906f56fe8fc88ea8bc3a79917ba
-
SHA512
8e62397249e5cc753333bc08f7dd72e7cebb2f196bd60cbe5d85ff277bc85436f785146cc38296e1430bf11f7effba3ea68b911a5e8ca120c0467b63216d6b44
-
SSDEEP
3072:F5L+TmkCC/6H7VAyZjFVA+Z89peccopp0pbpC5it2TMWeG:F5aVpeccopp0pbpuTMW9
Score10/10-
Discordrat family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-