General

  • Target

    d894256fa01f9770da3abbec7af18fd7.png

  • Size

    129KB

  • Sample

    240704-c9zekazhln

  • MD5

    f915c7aed5c023bc4258c09aa45f279f

  • SHA1

    75b20edfa4448ebf0ff2855d69a70fd4eedf374c

  • SHA256

    c0c315c0924a27c37df67daf282be5c253317b52d983bbfb7ae8465fe2a19919

  • SHA512

    ebd0cf1ef78eae81bb044a3d47f0ce56896d1198971596c7f6af11ed8c4f6e1e7bb64be121d43f1ce24fffe90dd9653fe5aa372f24bcf926bb8e58207e61a2ba

  • SSDEEP

    3072:d/iT53yCXuMTLi4/b8O5TycE69nxzleFr9QW5/XAIGviX:d/id3tuM3ilSFleh//QIGvs

Malware Config

Targets

    • Target

      d894256fa01f9770da3abbec7af18fd7.png

    • Size

      129KB

    • MD5

      f915c7aed5c023bc4258c09aa45f279f

    • SHA1

      75b20edfa4448ebf0ff2855d69a70fd4eedf374c

    • SHA256

      c0c315c0924a27c37df67daf282be5c253317b52d983bbfb7ae8465fe2a19919

    • SHA512

      ebd0cf1ef78eae81bb044a3d47f0ce56896d1198971596c7f6af11ed8c4f6e1e7bb64be121d43f1ce24fffe90dd9653fe5aa372f24bcf926bb8e58207e61a2ba

    • SSDEEP

      3072:d/iT53yCXuMTLi4/b8O5TycE69nxzleFr9QW5/XAIGviX:d/id3tuM3ilSFleh//QIGvs

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks