General
-
Target
https://github.com/wqlsz/discord-rat
-
Sample
240510-2xextsef3y
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/wqlsz/discord-rat
Resource
win10v2004-20240426-en
Malware Config
Extracted
asyncrat
popbobin
loan-mode.gl.at.ply.gg:3232
loan-mode.gl.at.ply.gg:56499
-
delay
1
-
install
true
-
install_file
ooga booga.exe
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
Syntax Bootstrapper
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:6606
127.0.0.1:39473
lolzpopbob-31243.portmap.host:7707
lolzpopbob-31243.portmap.host:8808
lolzpopbob-31243.portmap.host:6606
lolzpopbob-31243.portmap.host:39473
lolzpopbob-31243.portmap.host:31243
lolzpopbob-31243.portmap.host:54984
lolzpopbob-31243.portmap.host:32817
gte9kAyhP56e
-
delay
3
-
install
true
-
install_file
SyntaxBoostTrappera.exe
-
install_folder
%AppData%
Extracted
quasar
1.4.1
popbob
26.54.54.253:4782
e68ac88d-83ac-4c28-b500-1c248767b934
-
encryption_key
DA4DBB9EE2FF6F37FD6386C21A06F055A9BEF02D
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDir
Extracted
discordrat
-
discord_token
MTIyMjc0MTc1MDE3OTY5NjY2MA.GTaP_b.Fj7PPHRSC9HZBuqab-hq8gnmLm8HwKIuQEUqGo
-
server_id
1222323968766382140
Targets
-
-
Target
https://github.com/wqlsz/discord-rat
-
Quasar payload
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Scheduled Task/Job
1