General

  • Target

    13d9beeaced9055a40d4c4d8afb622ab468e7b08ae87b0da2dc283441320d71c

  • Size

    78KB

  • MD5

    e5c76e4a1b86a78756c37b842889a16d

  • SHA1

    b0232fccb40a600985140002752e21579627ceeb

  • SHA256

    13d9beeaced9055a40d4c4d8afb622ab468e7b08ae87b0da2dc283441320d71c

  • SHA512

    fc05438f4d61d470b3b8dc565ec82b74ca71680e0e9b13cc387af5c52cd5affcbe59f816c926e866af6fc262afd8b3a7ccbe7c714d437bc6923504eb4d9e9ea7

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+XPIC:5Zv5PDwbjNrmAE+fIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyNzQxMDkxOTI0NDU2NjY1OQ.GrYgbk.ssbdSWTWQ238-WOkS4Kx8Um0xFW_d_wKie72Go

  • server_id

    1227411660403114065

Signatures

  • Detects executables containing URLs to raw contents of a Github gist 1 IoCs
  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 13d9beeaced9055a40d4c4d8afb622ab468e7b08ae87b0da2dc283441320d71c
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections