General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    240713-lmssyaxgpf

  • MD5

    3031ae85f4de17d5f41940f89a855213

  • SHA1

    860aebd1e537495b271615e4ae3607319b11c5d7

  • SHA256

    563be73ddf44bdcdf490d01e7e439c784736e43991c87620b749a76a381f9b46

  • SHA512

    26a876b4828b12ed5e9e750e0a5a279b2c59263d505b1649d4ac4baacb2d0b77712bd3a94c0fa37ff6e043cb6d90265e3c8cf2a482a5988b9063d4eae203cac2

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+0PIC:5Zv5PDwbjNrmAE+oIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI1OTU0NjY1NDcwMTM4NzkyNg.Gj464p.pSyTekhzp90MrFkDpz9vcK-VqNwVcH7l8kIyZ8

  • server_id

    830125037499580426

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      3031ae85f4de17d5f41940f89a855213

    • SHA1

      860aebd1e537495b271615e4ae3607319b11c5d7

    • SHA256

      563be73ddf44bdcdf490d01e7e439c784736e43991c87620b749a76a381f9b46

    • SHA512

      26a876b4828b12ed5e9e750e0a5a279b2c59263d505b1649d4ac4baacb2d0b77712bd3a94c0fa37ff6e043cb6d90265e3c8cf2a482a5988b9063d4eae203cac2

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+0PIC:5Zv5PDwbjNrmAE+oIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks