General
-
Target
NebulaExecutor.rar
-
Size
27KB
-
Sample
250202-c1ezka1ngt
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
Static task
static1
Behavioral task
behavioral1
Sample
NebulaExecutor.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NebulaExecutor.rar
Resource
win10v2004-20250129-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzNTM0MTMyNTUxMTU1NzE5MQ.GJnF0Z.22Phw5o1Gt-WE6QFl0-J7NOftNtcUB5FqXmuQE
-
server_id
1334897427899093072
Targets
-
-
Target
NebulaExecutor.rar
-
Size
27KB
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
Score10/10-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-