Behavioral task
behavioral1
Sample
Image.jpg.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Image.jpg.exe
Resource
win10v2004-20240412-en
General
-
Target
HEUR-Exploit.MSIL.UAC.gen-5f81e8c57e0fda64b5a61bdeff49fad83036826cb626ba112c6bc7d9698428b1
-
Size
28KB
-
MD5
de690dd604ee0c55fc0a7857abf9e74b
-
SHA1
f276afac39409ff335af46fb89d56ad47fd873d1
-
SHA256
5f81e8c57e0fda64b5a61bdeff49fad83036826cb626ba112c6bc7d9698428b1
-
SHA512
750c830b760b7defb95019f0ab947b5308229944fe7c472185867e0ec1269baf224c6c4a31f06bfd223dd6c060648c2c719ad4af9a50b21443fc61141d209cbb
-
SSDEEP
768:F5lz6yZDgr9OtA8dozZCLy+d/P58ZjCTFOSUg:Fd2raN8ZegSB
Malware Config
Extracted
discordrat
-
discord_token
MTIxODk2NDQwNzI3OTk0Mzc3NQ.GS7a6G.MN50mEh7UMgOL_rB18LZuCG7dB8Bra64Ihw50A
-
server_id
1227976374644510781
Signatures
-
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule static1/unpack001/Image.jpg.exe INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Image.jpg.exe
Files
-
HEUR-Exploit.MSIL.UAC.gen-5f81e8c57e0fda64b5a61bdeff49fad83036826cb626ba112c6bc7d9698428b1.zip
-
Image.jpg.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ