General

  • Target

    spoofer.exe

  • Size

    78KB

  • MD5

    a779743acadbadf0da2c90fbb8d5aacf

  • SHA1

    20c717b3fa1929944b8a8a200bcefa5cf342d260

  • SHA256

    126b388b43b32fe5922aabe48be134d32f52b92719d817aeac80d88c5c07e20d

  • SHA512

    5c1265fe55d61dcc4b11a9cf97b753ba80101808461304ccbf1f76e7a783af931a69d367c54dad3cff166e569ace7570f3236060c87c86715a01fa04996eb5f8

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+RPIC:5Zv5PDwbjNrmAE+BIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0MDcyOTAxNzg4ODUzODY1NA.GEnc4A.c7N7LXjTd2QAlffg0g72Gg6yGdyHVZmhIZBcps

  • server_id

    1240883770677264404

Signatures

  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • spoofer.exe
    .exe windows:4 windows x64 arch:x64

    Password: 123


    Headers

    Sections