General
-
Target
executor.exe
-
Size
78KB
-
Sample
250129-e1rdps1kes
-
MD5
10b2da716481ed70b391ae0f97d0e64e
-
SHA1
22ccb5a19045d2db496ad0c5c0326e620e6e620f
-
SHA256
63e676624115c3fd9febe7649f8c65dd65cb20df39595cbcc96b3781d1dee83c
-
SHA512
f5dee05290a9a66975495c061fba0b9e567fe57ddff626b517388d246cacb825f92f0e6670a7f064307d478b49ceaf0f7d9f18bd8c615ca53b7fadb362d33b8c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+vPIC:5Zv5PDwbjNrmAE+XIC
Behavioral task
behavioral1
Sample
executor.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMzk4NzY2MTExMDU3NTEzNA.GUgCAs.PJkCkd2O0ZfCoCsqkLw6C4P8onABarxkOywQhI
-
server_id
1332933302335832155
Targets
-
-
Target
executor.exe
-
Size
78KB
-
MD5
10b2da716481ed70b391ae0f97d0e64e
-
SHA1
22ccb5a19045d2db496ad0c5c0326e620e6e620f
-
SHA256
63e676624115c3fd9febe7649f8c65dd65cb20df39595cbcc96b3781d1dee83c
-
SHA512
f5dee05290a9a66975495c061fba0b9e567fe57ddff626b517388d246cacb825f92f0e6670a7f064307d478b49ceaf0f7d9f18bd8c615ca53b7fadb362d33b8c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+vPIC:5Zv5PDwbjNrmAE+XIC
-
Discordrat family
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Legitimate hosting services abused for malware hosting/C2
-