Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240221-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
2790f93f403b490f8b734c369af950d6
-
SHA1
d19bdcc8380f4650ddf2f910916de18399bb34f1
-
SHA256
134cc668d2cfab14d00c6e66abb28da8548e13a24826e7b9796927bbbfa39e35
-
SHA512
9d68d3b156f1064740d423e7868cb43387f1aa1850677f74a04140903675170f1433955140b7579aae8a2a5d1b68272dcc74c4c32f95e0172e67e32bbc51ff17
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTE5NDM2MTI3NTcwNzMwNjExNQ.GkkJ7L.B-gb9AyspwazJw_Z99sQx6qMPQjG-mbiQT5K58
-
server_id
1209896579893563432
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client-built.exe
Files
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ