General
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0
-
Sample
240226-pn91dsdg9s
Score
10/10
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0
Resource
win10v2004-20240221-en
23 signatures
1800 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE3ODY0NDY3MjY1OTM0MTQxMg.GBL0VX.hLJt950Tw3kAXvkzecVPnmkBZdB6z31D-ULof4
-
server_id
1211651163519189044
Targets
-
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0
Score10/10-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-