Behavioral task
behavioral1
Sample
Hackertool.exe
Resource
win11-20240704-en
General
-
Target
Hackertool.exe
-
Size
78KB
-
MD5
7e2b58c12f20e20e5b989152f7bcf2c6
-
SHA1
afbd2ec83157c6465c042bc7292085e8eb5fc6e4
-
SHA256
c6e3f79e8aaebefaa7904f80ca4b8bfc5855c1271c7641386f6b64dfb05b7edc
-
SHA512
019823d8b5e7fb11c866af92e117f453feb6deb0e81d4ee644ba474d20d5b37eddfced41e4a993be1e836e302598ef6c7787f826d99ebff1f9d76e1f631f5fb5
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1Nzk1NzI4ODU0MzUyMjk0OA.GP2sBR.AIv9_MC9xE50IAJKesBJhvHufgXXZzU9lUzGu8
-
server_id
1257954812113190942
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hackertool.exe
Files
-
Hackertool.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ