General

  • Target

    hgvj.exe

  • Size

    593KB

  • Sample

    240223-zaw7gshe3v

  • MD5

    cd7ea040328d5a26e9db4e3fe252b840

  • SHA1

    9be79e3a740718d1b7f92c9e5a1ce0b782e47386

  • SHA256

    260ad25ba866a0c2c53fb170fa87debbf9041a87b70a0c632786adf379c2db3a

  • SHA512

    4e6372353c81180631ffd2378a53b2dc53408dd1e831b020eced199b1a8b5aeb53631e4e0fc1784c7e7848fd036b056ae16a78ee77dc3479c0960b576c82b86e

  • SSDEEP

    12288:54MQmjJfELB92d9b0G8vdqk20H/ORA0y5ZU9E5bjJo9l:54MNJCM74vHGRY5+9OnJ

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMDY4MTk1NTQyNzk1MDY4Mg.Gy5dHF.usUl_OuFhHY1gNEyIwlH2QhBUK8j2WHU94qm9Q

  • server_id

    1210681778017144962

Targets

    • Target

      hgvj.exe

    • Size

      593KB

    • MD5

      cd7ea040328d5a26e9db4e3fe252b840

    • SHA1

      9be79e3a740718d1b7f92c9e5a1ce0b782e47386

    • SHA256

      260ad25ba866a0c2c53fb170fa87debbf9041a87b70a0c632786adf379c2db3a

    • SHA512

      4e6372353c81180631ffd2378a53b2dc53408dd1e831b020eced199b1a8b5aeb53631e4e0fc1784c7e7848fd036b056ae16a78ee77dc3479c0960b576c82b86e

    • SSDEEP

      12288:54MQmjJfELB92d9b0G8vdqk20H/ORA0y5ZU9E5bjJo9l:54MNJCM74vHGRY5+9OnJ

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v15

Tasks