Behavioral task
behavioral1
Sample
spoofer/spoofer.exe
Resource
win10-20240404-de
General
-
Target
spoofer.rar
-
Size
26KB
-
MD5
fc2a2ef98fc4876c0ff4df059d4eefc6
-
SHA1
48085f379a0601eb521dc7648f58de1b515bbb0a
-
SHA256
dc303bf4fc27ed283589c456d5a5b40e9a0bc97ad9e3fcf9c603998491743248
-
SHA512
a7a0008a1f27a9bc11b666cfb2c079fbdadf7f587c3b76f3e41179e4fd4c5ba19c556ec81bcff8df56ebca7dc986bf477b9e392a48d1101bce15fd7a05f3cbf3
-
SSDEEP
384:5sYejZmEmE7KXX6cQyztVXgrYINy9HpxDpNYyHkgs+2tjPsQOYkb/TErqO085Qmn:5sxl/66Wub6b1s+SzsQkIqUQnW
Malware Config
Extracted
discordrat
-
discord_token
MTI0MDcyOTAxNzg4ODUzODY1NA.Grdfmd.TkiEwQyP2bUA1RIGNTE-wkWpyVRP_iGf-NHIsI
-
server_id
1240883770677264404
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/spoofer/spoofer.exe
Files
-
spoofer.rar.rar
-
spoofer/spoofer.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ