General

  • Target

    d82bc37ca66a2c6b78dcf7934a818d3d7692890fffe98104f30e71d9f0875e73

  • Size

    78KB

  • MD5

    de09ec6cf640a8b26391f70e1243e712

  • SHA1

    669ce7e781522bcadb745e4e50ce12c903f043b5

  • SHA256

    d82bc37ca66a2c6b78dcf7934a818d3d7692890fffe98104f30e71d9f0875e73

  • SHA512

    f146d29dfc1922e719e07f58a659a540f75d08cd20f1b54fd5070b7cfaa748c83de6ee47e80b60269530c790a3d6962f84b1a08a6459041378e6c2b36e6d01e2

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+dPIC:5Zv5PDwbjNrmAE+NIC

Score
10/10

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNDU2NzE3OTczMTczMDQ5Nw.GCNDco.4i7LGmddJq3Pm_4DoLSiC2SvJgPZvHtymWAy_Y

  • server_id

    1195057881633001625

Signatures

  • Detects executables containing URLs to raw contents of a Github gist 1 IoCs
  • Discordrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • d82bc37ca66a2c6b78dcf7934a818d3d7692890fffe98104f30e71d9f0875e73
    .exe windows:4 windows x64 arch:x64


    Headers

    Sections