General
-
Target
passwords.exe
-
Size
78KB
-
Sample
250130-gqjl8ayrbq
-
MD5
513ecef8b9161f44f6d822a85d18734c
-
SHA1
8e8795f80d2c7db261c3c7457b4f06fb86266af4
-
SHA256
5a23b54943959e05cf195c9936d1016eeb264d7679bb802fe9ffd79e9bbfd7f3
-
SHA512
1f891e184af63c8f17a12c100060ce1abcc2208c1c928287a55489d35708d91c19bc7fea03e0098e659b3db3f6de3ede0f51e1794bfbff383243cb2a8a28b345
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Behavioral task
behavioral1
Sample
passwords.exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMzk4NzY2MTExMDU3NTEzNA.GBxxcG.hCxvPKnNhuDVqFwQAGcXXL8xZHa8nfwbs3kxmk
-
server_id
1334397739173281835
Targets
-
-
Target
passwords.exe
-
Size
78KB
-
MD5
513ecef8b9161f44f6d822a85d18734c
-
SHA1
8e8795f80d2c7db261c3c7457b4f06fb86266af4
-
SHA256
5a23b54943959e05cf195c9936d1016eeb264d7679bb802fe9ffd79e9bbfd7f3
-
SHA512
1f891e184af63c8f17a12c100060ce1abcc2208c1c928287a55489d35708d91c19bc7fea03e0098e659b3db3f6de3ede0f51e1794bfbff383243cb2a8a28b345
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Score10/10-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2
-