General

  • Target

    Exploiter.rar

  • Size

    231KB

  • Sample

    240504-vx9zmscc9s

  • MD5

    33c8cd926124ef8a3acdb712c67922a7

  • SHA1

    fdfc1b0bc4d26153d274ee49c506f9b46d3cc3dc

  • SHA256

    25981c5a22378707acf5960d2aa40a50516a1dcb9ea82dfdc1bb2067f6811bac

  • SHA512

    91d788f6ae96ae7659b01733357af7d85615cb836828913db9bd552b674dbc98b380142abf25c8af33a99b65b008dcb60143e726b4baa9068aff25b652e606b9

  • SSDEEP

    6144:81hpdhh2JVOffFcD7fxjlYfU/aPF7iy0t:opPh9CxjylPoj

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNjMwNTc2MjU5NTI0MjA1NQ.G6VLak.4vdqf2Zl4iPZ7e-AyK9ykkGmr9LZPBhhchrbdY

  • server_id

    1236306342461964380

Targets

    • Target

      Exploiter/Exploiter‮‮.exe

    • Size

      447KB

    • MD5

      1f45fbe95cf28a77d25bf115cc3002fe

    • SHA1

      c1483030959bb50c1a3875b8202852bffee0913c

    • SHA256

      514e6cb42b3b1431e89a415af7d0a98e51e4239be0c085a1730c996eef71cd9d

    • SHA512

      f58574dd9efdf44bdb81adb3e6c1381a59c9afd1c7486359a8efb310e6d0e94511770288ac47cbafa80e2cb3467cb57e0c7a7e9fecc1e012dd643cf79df5d5b4

    • SSDEEP

      12288:XCQjgAtAHM+vetZxF5EWry8AJGy0x4xLe4:X5ZWs+OZVEWry8AFtxe4

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks