General
-
Target
MinicoInstaller.exe
-
Size
7.6MB
-
Sample
250222-a3sx4awmw9
-
MD5
efc16c463c8b66799da69dadbd7a8124
-
SHA1
500670a66e445c8d3a467e14efde7991824b9ff2
-
SHA256
15f679670aade72a91e3d0596b334441402453e29d4e4f0af509967799bc6ee2
-
SHA512
927eb8421f66a85b7bb8041c5a1bbf2973b96f958cfa59a5ecb89ecd528cc5d91468eef3983976611a28da860f92295066dc4e377f8851fa83daab5f543df6e5
-
SSDEEP
196608:+trnrL9SPYoGavO2KaH/K1QFcG1cpRHneRNB3SuN1G/s:+BnrL9SrGan5H/KEupxU3VN1
Static task
static1
Behavioral task
behavioral1
Sample
MinicoInstaller.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
MinicoInstaller.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzOTYyNDY0NTA5MDg3MzM5Ng.GSLke3.if1DF-bdxVyPF9XjyqM9CkH6lrVfd1LG6rrc0o
-
server_id
1339657624517349500
Targets
-
-
Target
MinicoInstaller.exe
-
Size
7.6MB
-
MD5
efc16c463c8b66799da69dadbd7a8124
-
SHA1
500670a66e445c8d3a467e14efde7991824b9ff2
-
SHA256
15f679670aade72a91e3d0596b334441402453e29d4e4f0af509967799bc6ee2
-
SHA512
927eb8421f66a85b7bb8041c5a1bbf2973b96f958cfa59a5ecb89ecd528cc5d91468eef3983976611a28da860f92295066dc4e377f8851fa83daab5f543df6e5
-
SSDEEP
196608:+trnrL9SPYoGavO2KaH/K1QFcG1cpRHneRNB3SuN1G/s:+BnrL9SrGan5H/KEupxU3VN1
-
Discordrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3