General

  • Target

    celex.exe

  • Size

    6.6MB

  • Sample

    240226-2b258sac81

  • MD5

    1aabc9a82b078abd11a36f6bf734a905

  • SHA1

    77c6ea875901bfb7dec842e12653f35174b56f21

  • SHA256

    eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100

  • SHA512

    377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb

  • SSDEEP

    196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMTQxNjgxMzUyNzc2NTAwMw.GDkq7R.O8XX6ytVrJ_HArSHt0Bya-oJk0Qqej2-l4UJUo

  • server_id

    1211416944469737502

Targets

    • Target

      celex.exe

    • Size

      6.6MB

    • MD5

      1aabc9a82b078abd11a36f6bf734a905

    • SHA1

      77c6ea875901bfb7dec842e12653f35174b56f21

    • SHA256

      eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100

    • SHA512

      377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb

    • SSDEEP

      196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      ���.pyc

    • Size

      857B

    • MD5

      3215d585f57e1f08cbb537f8a83533e5

    • SHA1

      1ac27a89e3a45a500061dbba274a8c28a598be30

    • SHA256

      31aa2c08707b455a43c17c20859a6c2dcf5581b6aa502ca180f38b151f9552e5

    • SHA512

      fa6ba123226f7530c0395c047eacf79bdca3f9575a55ad0ab6d82f7b87beebbda14d2833901784f6921625c2c28e5553d4f1f732e0a6373a6d11db9061cc3674

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks