General

  • Target

    DiscordToolTrial.exe

  • Size

    11.0MB

  • Sample

    250210-wlxeva1lg1

  • MD5

    37e1d259961aeef3abaceb8abc4ee375

  • SHA1

    760d43e6a1b44e06ab02f87d182ec8bb5e6bb185

  • SHA256

    686724eda1b76e06786349c6b472b749b42f9937bb3b18ebb15e9ce2af04cb0c

  • SHA512

    ae9c3921ebbc0f7cb0928dbbafbdb1b646d3d687c0eeaed6f93dc70505304f98e7483ef7f458215c1534acc762c5983a435d631185f86d01ddb0a8a947025a96

  • SSDEEP

    98304:4WZvITBChCqFsMamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rNA:4W9IdqiteNlpYfMQc2s8hn6ksqdhi

Malware Config

Targets

    • Target

      DiscordToolTrial.exe

    • Size

      11.0MB

    • MD5

      37e1d259961aeef3abaceb8abc4ee375

    • SHA1

      760d43e6a1b44e06ab02f87d182ec8bb5e6bb185

    • SHA256

      686724eda1b76e06786349c6b472b749b42f9937bb3b18ebb15e9ce2af04cb0c

    • SHA512

      ae9c3921ebbc0f7cb0928dbbafbdb1b646d3d687c0eeaed6f93dc70505304f98e7483ef7f458215c1534acc762c5983a435d631185f86d01ddb0a8a947025a96

    • SSDEEP

      98304:4WZvITBChCqFsMamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rNA:4W9IdqiteNlpYfMQc2s8hn6ksqdhi

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks