General
-
Target
Client-built (1).exe
-
Size
78KB
-
Sample
250203-vnzsbaxlew
-
MD5
c305efabf3779d300d766a4e2990f6cd
-
SHA1
febf6b16a6e3de42427fc0fbc2a1191acc66aaa8
-
SHA256
9c538454c0d5bc061140f31eb10784e7f525f865dcdaa4b66aa689c1a85543b8
-
SHA512
05653e94292a2aa95203857b6efb0cfe4d9562a6f94c8dce6d12063ad4e39021abc42fe5058b15a2906715b232388dca6e272f3336e915c70ded964454a850cc
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Behavioral task
behavioral1
Sample
Client-built (1).exe
Resource
win11-20241007-en
Malware Config
Extracted
discordrat
-
discord_token
MTMwODUzODYxNDg0MTM0NDAyMQ.GYcOVt.Gp_DOcHBox7P0N-zNBTm49eq6NTvt_N2AxMvF8
-
server_id
1336013454258995351
Targets
-
-
Target
Client-built (1).exe
-
Size
78KB
-
MD5
c305efabf3779d300d766a4e2990f6cd
-
SHA1
febf6b16a6e3de42427fc0fbc2a1191acc66aaa8
-
SHA256
9c538454c0d5bc061140f31eb10784e7f525f865dcdaa4b66aa689c1a85543b8
-
SHA512
05653e94292a2aa95203857b6efb0cfe4d9562a6f94c8dce6d12063ad4e39021abc42fe5058b15a2906715b232388dca6e272f3336e915c70ded964454a850cc
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-