General

  • Target

    Z3US Executor.exe

  • Size

    78KB

  • Sample

    240515-xzebvsfe4t

  • MD5

    027960765e97ac9bbed5e2247bdeab07

  • SHA1

    df32d964c1a558515693b6601d50949fae85e33a

  • SHA256

    e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58

  • SHA512

    8e959f53417f2966bf8573d75ecff2a759c78998c974f4ba740c794465e8bf09490d5e3b263119bdcfb793437303d66a0576052175f813c7007b64c87b36e7ef

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+7PIC:5Zv5PDwbjNrmAE+zIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTExOTY4MDYxNDIxNjUxNTY5NQ.GnP5TS.XB8k2brD-RpT8GqadOD-n2Ay0IKV9q3M55LoiA

  • server_id

    1240327546898485268

Targets

    • Target

      Z3US Executor.exe

    • Size

      78KB

    • MD5

      027960765e97ac9bbed5e2247bdeab07

    • SHA1

      df32d964c1a558515693b6601d50949fae85e33a

    • SHA256

      e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58

    • SHA512

      8e959f53417f2966bf8573d75ecff2a759c78998c974f4ba740c794465e8bf09490d5e3b263119bdcfb793437303d66a0576052175f813c7007b64c87b36e7ef

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+7PIC:5Zv5PDwbjNrmAE+zIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks