General
-
Target
https://discord.com/channels/1299358203980550214/1325598384987308102/1351854751075270738
-
Sample
250325-lfwagsxny8
Score
8/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/1299358203980550214/1325598384987308102/1351854751075270738
Resource
win11-20250313-en
25 signatures
900 seconds
Malware Config
Targets
-
-
Target
https://discord.com/channels/1299358203980550214/1325598384987308102/1351854751075270738
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-