Behavioral task
behavioral1
Sample
Client-built.exe
Resource
android-x64-20231215-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
ac5e44b54712023f5df1e6b639329d00
-
SHA1
11c0c236f9d95bfbf3a59e66e80d3537f3b6c2d6
-
SHA256
8721f07cfcc12c07a23cc1e8dbcf761ab955dea7a856edc7d704c381b0678571
-
SHA512
307f4998c0817d14731c56b887141d175bab8c3a4ac7488fb8ddfc500565e28839d9a8c34df0da31c7af3d3ac460e7e40ede82272a397e7df7346097d41312ce
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WPIC:5Zv5PDwbjNrmAE+SIC
Malware Config
Extracted
discordrat
-
discord_token
MTE4ODMwMDU5MTc4OTc2ODczNA.G0Vzr4.sBsYKRVI_rDFF9BnzK9aSDvZsiRnr9eZGrgDdo
-
server_id
1188300133297819648
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client-built.exe
Files
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ