Resubmissions

08-06-2024 08:08

240608-j1h5jsad3x 10

08-06-2024 08:02

240608-jxh1daac9y 10

General

  • Target

    Blank_and_Remote_Desktop.exe

  • Size

    8.7MB

  • Sample

    240608-j1h5jsad3x

  • MD5

    2dc256e33f0cd66b15073ff1fe67d6d2

  • SHA1

    b2ce0c167954623f5f3c81e281f439e660660a8e

  • SHA256

    ff7c3a604688bef1b2f61414d6fc9233aff7b6d4f09f53b26e3a6c1d0dbf2cc8

  • SHA512

    c28637d096e0e2c7e7a150f34fa85f5126b243361fb422ec71655065ae6bdd24557c85e0b371868575dcc0901e49d602b6a47fb7851d6531dc910a43432d062e

  • SSDEEP

    196608:Aqw6fdVDXXpjceQE7LRQMkUvQbMnKgmbkB4oYJ1q4pre/Z:xJIe7LRQMkUvQbmKgY9NS/Z

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0ODQ3ODYzMjY3NDg1NzA3MA.Gm1udg.GISH3HAGU7rYHzskiJvuW_ow-VZKZ99H29z0vY

  • server_id

    1248761195348103250

Targets

    • Target

      Blank_and_Remote_Desktop.exe

    • Size

      8.7MB

    • MD5

      2dc256e33f0cd66b15073ff1fe67d6d2

    • SHA1

      b2ce0c167954623f5f3c81e281f439e660660a8e

    • SHA256

      ff7c3a604688bef1b2f61414d6fc9233aff7b6d4f09f53b26e3a6c1d0dbf2cc8

    • SHA512

      c28637d096e0e2c7e7a150f34fa85f5126b243361fb422ec71655065ae6bdd24557c85e0b371868575dcc0901e49d602b6a47fb7851d6531dc910a43432d062e

    • SSDEEP

      196608:Aqw6fdVDXXpjceQE7LRQMkUvQbMnKgmbkB4oYJ1q4pre/Z:xJIe7LRQMkUvQbmKgY9NS/Z

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks