General
-
Target
New Text Document (2).html
-
Size
183B
-
Sample
250217-psnyqaynfy
-
MD5
f5a53b2d1c42e95722d35878c76c8979
-
SHA1
186fbc118db30502b21d1e007ffd8049ccaddf60
-
SHA256
0fa014846b4e8dfac774a8ef77c919e1bd3bb2a19312bec1e6963411df04bbf4
-
SHA512
d5def149dc40bab3e8f60637efee43be8a7348c7cd04a640affd59128b8072b24b1387ed6c9df85709b095c5768ab0a50dec5690c9c4b992e141bc13f4cc6517
Static task
static1
Behavioral task
behavioral1
Sample
New Text Document (2).html
Resource
win11-20250210-en
Malware Config
Extracted
discordrat
-
discord_token
MTMxMDkxODg1Mjk4ODc2NDE4MA.GzBXeG.IQdsANXf5vF4yFt_OatJlXeGmRVH0AzHFLzfHw
-
server_id
1310919517383294990
Targets
-
-
Target
New Text Document (2).html
-
Size
183B
-
MD5
f5a53b2d1c42e95722d35878c76c8979
-
SHA1
186fbc118db30502b21d1e007ffd8049ccaddf60
-
SHA256
0fa014846b4e8dfac774a8ef77c919e1bd3bb2a19312bec1e6963411df04bbf4
-
SHA512
d5def149dc40bab3e8f60637efee43be8a7348c7cd04a640affd59128b8072b24b1387ed6c9df85709b095c5768ab0a50dec5690c9c4b992e141bc13f4cc6517
-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-