General
-
Target
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1.exe
-
Size
814KB
-
Sample
250124-n9hbtsypcn
-
MD5
477c02d117bd27ba71ea23c7e43e11f7
-
SHA1
945283d198fdf56b286b27951ee6af7c6eb155c0
-
SHA256
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1
-
SHA512
3097a138b7c850eb70d7639893c8157b5c546db6732fb337c88ae7573f03ec8c504dbd627c8e3e62f7f401a09ec4816e811e15bf9e8146b258f32e588d7a930c
-
SSDEEP
12288:8LJZSYMYiORE18Uibjk7WqX1ouQgqlzj+znTfipwMPlhaySdXYAbdE7znYYz:8VgY5bGvBQgqzj+3fitP/upYAbszYYz
Behavioral task
behavioral1
Sample
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMyOTY4MDQ1OTUwMzg5ODYyNA.GrobFq.k-NKOsgA447-8Lu7-dZzPZ88u6DfH4v3Whpvok
-
server_id
1296062254936096800
Targets
-
-
Target
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1.exe
-
Size
814KB
-
MD5
477c02d117bd27ba71ea23c7e43e11f7
-
SHA1
945283d198fdf56b286b27951ee6af7c6eb155c0
-
SHA256
afc011779e0cbb0f9e2b86054c457f6a0b0a2dcf4a4df09de013c76ed2b552a1
-
SHA512
3097a138b7c850eb70d7639893c8157b5c546db6732fb337c88ae7573f03ec8c504dbd627c8e3e62f7f401a09ec4816e811e15bf9e8146b258f32e588d7a930c
-
SSDEEP
12288:8LJZSYMYiORE18Uibjk7WqX1ouQgqlzj+znTfipwMPlhaySdXYAbdE7znYYz:8VgY5bGvBQgqzj+3fitP/upYAbszYYz
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-