General

  • Target

    PyrusC2

  • Size

    78KB

  • MD5

    27f969d17693c222cdd0494cb2a09f80

  • SHA1

    d5425670f1d1d40fb04a2a1c72dc7572a748a67a

  • SHA256

    402d83a67acf9591aaf8dc4e62dcafc4dd10f3987cb7a175f0c288de77a86ad7

  • SHA512

    33e8e65940074c84f24697ee6cc2654289419f02ca481033bf3c369f26fe4f16c3990a822fe0842f3feb2febe4cb8c57d8e3d1acc63d4c560e54ebe0806a42df

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMzUwMTgyMzQxMTgyMjYzMg.G_3rn-.hlmdq27ziRAcKVZvZ9b7woSeSyqsovKDo0qouc

  • server_id

    1200522482130632846

Signatures

  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • PyrusC2
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections