Resubmissions

30-06-2024 19:18

240630-xz5h2swerq 10

29-06-2024 11:19

240629-nevzfazanq 10

General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    240629-nevzfazanq

  • MD5

    dfa5cb019d9d54fb8f2e9c45087a2d7f

  • SHA1

    5a81d19b82c4687981a9c05353a6b2c6a715ee2c

  • SHA256

    40a705165bed85c9222db3909f65535f16b41d970f1eac7f76bb6d668c6a42bd

  • SHA512

    805f87a1ba2c47e6b6f91a3287ed38897f5e45fdde810edad3630a4368c377e45b43bfd5950716f83130be52ce6373f0c9aa7d46f03053290b230c9310922215

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI1NTQ3NzU2NTk1NTUwNjE5Nw.GQUX06.Pbq0TWF2GRv-SAO5r1-eUeE6Sd2lIdRSlv47kk

  • server_id

    1255474002336546846

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      dfa5cb019d9d54fb8f2e9c45087a2d7f

    • SHA1

      5a81d19b82c4687981a9c05353a6b2c6a715ee2c

    • SHA256

      40a705165bed85c9222db3909f65535f16b41d970f1eac7f76bb6d668c6a42bd

    • SHA512

      805f87a1ba2c47e6b6f91a3287ed38897f5e45fdde810edad3630a4368c377e45b43bfd5950716f83130be52ce6373f0c9aa7d46f03053290b230c9310922215

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks