General

  • Target

    celex.exe

  • Size

    6.6MB

  • Sample

    240226-z92k9agh4t

  • MD5

    1aabc9a82b078abd11a36f6bf734a905

  • SHA1

    77c6ea875901bfb7dec842e12653f35174b56f21

  • SHA256

    eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100

  • SHA512

    377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb

  • SSDEEP

    196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMTQxNjgxMzUyNzc2NTAwMw.GDkq7R.O8XX6ytVrJ_HArSHt0Bya-oJk0Qqej2-l4UJUo

  • server_id

    1211416944469737502

Targets

    • Target

      celex.exe

    • Size

      6.6MB

    • MD5

      1aabc9a82b078abd11a36f6bf734a905

    • SHA1

      77c6ea875901bfb7dec842e12653f35174b56f21

    • SHA256

      eb136670a24ac3d3f43680b844c95d6b7fa35102f42ad07e39cd93f6b68b8100

    • SHA512

      377df0ab35943bf5694c5e06204704ea26ac41842a3752fb2d0a3497b12a68938b3bf1aa877016e5ddf98138950256ccc0a7f135b21937d1943f0d6f0f7f9bbb

    • SSDEEP

      196608:ufZBJDOYjJlpZstQoS9Hf12VKXMSELFexb2d:GBpGt7G/MyyFeEd

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks