Behavioral task
behavioral1
Sample
Hardware Spoofer.exe
Resource
win10v2004-20240709-en
General
-
Target
Hardware Spoofer.exe
-
Size
78KB
-
MD5
ef0e02648400217a2439479006ea078e
-
SHA1
59227c31761b27f1c5dab07c6ea6228946339ce3
-
SHA256
9515c899651eb0f87902193c595ca7babd947ed36ce0f8c9515f41e6a4b2890b
-
SHA512
46e4bce6d53d7845f6e3dd3a16e35797c5c4dcee453d21f967b7188b3b1218363b5a6b0a1ad460cf2a35a3114afa7c72858e3efc98fb2035d7191d1cda1af7bc
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+EPIC:5Zv5PDwbjNrmAE+YIC
Malware Config
Extracted
discordrat
-
discord_token
MTExODY1MTM0MDY5MjkzMDU4MA.GyYPbd.gv_mSClOMYmZ_EMjVhy1iGJpGBV4mylJ_ARxXk
-
server_id
1118654792068251759
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hardware Spoofer.exe
Files
-
Hardware Spoofer.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ