Behavioral task
behavioral1
Sample
LARL (2).exe
Resource
win10v2004-20231215-en
General
-
Target
LARL (2).exe
-
Size
78KB
-
MD5
90c44db5dcb198f00a7fab2d8bc5fbe7
-
SHA1
8cce491f9ac1230c683295407642650be50fd0ac
-
SHA256
5d84ad6a394a4d0a5a00e2a8d06fed788ce6965e5bae14826c8946a59076e9a5
-
SHA512
bccac11206212670ed9457edc1e66a62ff72028e0c5382fbb5e6f5a4635cdc9c12304ec25038a558c2be42f981e0630fecf9a40b6815191907121d04dd089fed
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LTPIC:5Zv5PDwbjNrmAE+3IC
Malware Config
Extracted
discordrat
-
discord_token
MTIwMjYyMzAwODU3ODA4NDg4NA.GgcPjo.He0V9oY4YayjSfsb70kfqA7FU6xJNAKPIGc3ic
-
server_id
1202621218356854844
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource LARL (2).exe
Files
-
LARL (2).exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ