Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win10v2004-20240508-de
General
-
Target
spoofer.exe
-
Size
78KB
-
MD5
8e6fb98f3f25728d8a34fe5d4942c3e2
-
SHA1
01cbdc686bfc0ea85043cc380b2b5c400501324d
-
SHA256
339148ca965a061d37221ebb6468f903eb7aa58b77c852ce5e77aa181b15e996
-
SHA512
32fcc4cc41cf138577085770215a3d9963934a6d8234c1ae6921b292e22a682044e52595202d6d87144b867d227b4aeb8f792c07c5fdbdc062926c551611adca
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+OPIC:5Zv5PDwbjNrmAE+qIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0MDcyOTAxNzg4ODUzODY1NA.GVWaCY.kAhQo2x7zwrK3uirlZM4AWU9_r5y3S3bjY01SM
-
server_id
1240883770677264404
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spoofer.exe
Files
-
spoofer.exe.exe windows:4 windows x64 arch:x64
Password: 123
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ