General
-
Target
https://github.com
-
Sample
240329-n65mysha44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com
Resource
win7-20240221-en
windows7-x64
34 signatures
1800 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIwNDE2NTY4Njk3NzYyNjEyMg.GRhsTy.8H7CIfq-yp21uNxoK32TwO-EvLKKe8OdYxHSeY
-
server_id
1204166943272075375
Extracted
Family
stealerium
C2
https://discord.com/api/webhooks/1198109936962523207/lCQU_FP9ZB1b0q8fk_yTE8P2eBnjZiVz3Zb0cBvBttRQhZqr3Q71JCUV-x38qBEwIjcp
Targets
-
-
Target
https://github.com
-
Creates new service(s)
-
Drops file in Drivers directory
-
Sets service image path in registry
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2