General
-
Target
NebulaExecutor.rar
-
Size
27KB
-
Sample
250202-ctafhasqbl
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
Static task
static1
Behavioral task
behavioral1
Sample
NebulaExecutor.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NebulaExecutor.rar
Resource
win10v2004-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzNTM0MTMyNTUxMTU1NzE5MQ.GJnF0Z.22Phw5o1Gt-WE6QFl0-J7NOftNtcUB5FqXmuQE
-
server_id
1334897427899093072
Targets
-
-
Target
NebulaExecutor.rar
-
Size
27KB
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
-
Discordrat family
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-