General

  • Target

    xeroUWU.exe

  • Size

    78KB

  • MD5

    4ec487d0538495c269e0039d081d42fa

  • SHA1

    ecd574e1bbfda1119a778307609e85e6e696325b

  • SHA256

    4899596e68dd4b160a42a14c72f6be0d9a04a714023b0f54d770f8431ff925e8

  • SHA512

    4e778fe02eec094dc56ba55c4a4ebb7c395171acb333c755a9acc6a08e5ae3917b3c5a97c835399f64b2561de1f578aa5952b9376b901ed082617b2287aaeb6e

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+PKPIC:5Zv5PDwbjNrmAE+PWIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNzcwMzYwNDc3MzcxNTk5OA.GpnuZW.icMd9S8Xo3T9RHsU9bXhiKpUJaK62FUGK13WN4

  • server_id

    1237709600602722354

Signatures

  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • xeroUWU.exe
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections