General

  • Target

    nyxo aimlock.zip

  • Size

    28KB

  • Sample

    240328-vrp3aabd91

  • MD5

    8c58dbab07c1d42249ff7f36da10ba57

  • SHA1

    316abceeff9e1f4bc139c1d08bd63726a35c771e

  • SHA256

    9a8bfdc495a216a9c4042522796043ffc7f4651153d369cf3fd3637ec35190e2

  • SHA512

    1e1d8689d329a1801cc673e8f2f1a4fba7c7e77c1de8407e0eb95d147607bfed9f57e3341b9172c6275552b8ba666f66b70fb8521e3e58d499ebed0d95aed1e0

  • SSDEEP

    768:L5lz6yZDgr9OtA8dozX0t6Id6Pv4wmcv5hGI:Ld2r6rcH9maB

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyMjkzMTA2MzM4NzQ1NTUzOQ.GzvyiO.hWpvwSRqDF9zcO06McTFnTajKVkIy7Qs1p6kmw

  • server_id

    1222930826723987619

Targets

    • Target

      nyxo_aimlock.exe

    • Size

      78KB

    • MD5

      3e7ddc5f7fad580b7d36bd80714c343d

    • SHA1

      f2943c1c5024da64c5e077e5a2c4139f661f3cce

    • SHA256

      35afb2b65e7371130bd99515da2b695a009821c60d1006ea6bde3ee9532f842b

    • SHA512

      e7e706ae8d1e892a5e2b542e23419c9c030fa654c06a8e955ea64a5fad0c5e1fa094332a36f24d978e02d812e428d2b91e97fe6f8a26a80f67dffbc5b1c360c0

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks