General

  • Target

    solarabootstraper.exe

  • Size

    497KB

  • Sample

    240625-vpd71avfjk

  • MD5

    48258af1b1134dffa388c6f2590325c3

  • SHA1

    e2fa6a4351d7b358e6b20e9194b63b54751458d4

  • SHA256

    d0452f63e207ead4ba0828fba9cd46d54c08906ac3f35f1c0b27dda2d60fbc83

  • SHA512

    1eeceefb8843f72b55e1b517039ab53cd72af3bb294fe9b06ce0a6207749506bf299cd913a4a1088ffa002069821d346ec3fc045fa701014110beec03d7d208c

  • SSDEEP

    12288:4yveQB/fTHIGaPkKEYzURNA/bAgzfCxS6PZXOB4:4uDXTIGaPhEYzUzAT4SwZXv

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzOTEzMTk4MTc4NzI5OTkxMg.G2PouQ.rmLVRC29c13dyUDlcJhFL4MtNpJCMM3OTOmuyI

  • server_id

    1254334525543288912

Targets

    • Target

      solarabootstraper.exe

    • Size

      497KB

    • MD5

      48258af1b1134dffa388c6f2590325c3

    • SHA1

      e2fa6a4351d7b358e6b20e9194b63b54751458d4

    • SHA256

      d0452f63e207ead4ba0828fba9cd46d54c08906ac3f35f1c0b27dda2d60fbc83

    • SHA512

      1eeceefb8843f72b55e1b517039ab53cd72af3bb294fe9b06ce0a6207749506bf299cd913a4a1088ffa002069821d346ec3fc045fa701014110beec03d7d208c

    • SSDEEP

      12288:4yveQB/fTHIGaPkKEYzURNA/bAgzfCxS6PZXOB4:4uDXTIGaPhEYzUzAT4SwZXv

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks