General

  • Target

    YaliMod.exe

  • Size

    503KB

  • Sample

    240716-p93s7swglg

  • MD5

    410fa0138a1dbe162066d3c05f8b7ca3

  • SHA1

    53101738d627e81f95c4c4cf81c6563a307f0226

  • SHA256

    1632d6243bbdace63217bad0951f5cf94eb1b3d11692f5a681f9476248015a8d

  • SHA512

    266bd556ffa3af20e11654cabb1f19d2e6ca0227afb87ef63d2dbe01389a7f3f80b847281229680dc7b44bfa31c691789bcf95ee5b73c31a7f6faadff37d8303

  • SSDEEP

    6144:M9j76xnImFZ1MmF8QTU/urSi38VoXM0qVoXM0n57XGY7wPQRC5uAiIOWO+oYKBIf:0jOtvHMm5xf8VomVoDkYU4RPAKP8J3P

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2MDk4NjU1ODQ4ODUxMDUyNQ.GhjU6O.gLCO4YDx_19-HQrbsTjHi1sZ2USHaMsZ0UaAr4

  • server_id

    1260985342689939576

Targets

    • Target

      YaliMod.exe

    • Size

      503KB

    • MD5

      410fa0138a1dbe162066d3c05f8b7ca3

    • SHA1

      53101738d627e81f95c4c4cf81c6563a307f0226

    • SHA256

      1632d6243bbdace63217bad0951f5cf94eb1b3d11692f5a681f9476248015a8d

    • SHA512

      266bd556ffa3af20e11654cabb1f19d2e6ca0227afb87ef63d2dbe01389a7f3f80b847281229680dc7b44bfa31c691789bcf95ee5b73c31a7f6faadff37d8303

    • SSDEEP

      6144:M9j76xnImFZ1MmF8QTU/urSi38VoXM0qVoXM0n57XGY7wPQRC5uAiIOWO+oYKBIf:0jOtvHMm5xf8VomVoDkYU4RPAKP8J3P

MITRE ATT&CK Enterprise v15

Tasks