Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win10v2004-20240508-de
General
-
Target
spoofer.exe
-
Size
78KB
-
MD5
a779743acadbadf0da2c90fbb8d5aacf
-
SHA1
20c717b3fa1929944b8a8a200bcefa5cf342d260
-
SHA256
126b388b43b32fe5922aabe48be134d32f52b92719d817aeac80d88c5c07e20d
-
SHA512
5c1265fe55d61dcc4b11a9cf97b753ba80101808461304ccbf1f76e7a783af931a69d367c54dad3cff166e569ace7570f3236060c87c86715a01fa04996eb5f8
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+RPIC:5Zv5PDwbjNrmAE+BIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0MDcyOTAxNzg4ODUzODY1NA.GEnc4A.c7N7LXjTd2QAlffg0g72Gg6yGdyHVZmhIZBcps
-
server_id
1240883770677264404
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource spoofer.exe
Files
-
spoofer.exe.exe windows:4 windows x64 arch:x64
Password: 123
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ