Behavioral task
behavioral1
Sample
cheat.exe
Resource
win10v2004-20240709-en
General
-
Target
cheat.exe
-
Size
88KB
-
MD5
a98dbae8957909fe8473f3fc87cc004e
-
SHA1
e8d7943e1b09f33c0066504dc89174429e0decfd
-
SHA256
097413e6718d4137d1c5d6373dff3c1275e297416e48bd1de2a26115d19d0a01
-
SHA512
89d62e3541d777a3b7c181fbfcfca3ff3ccd8368fc49e2d6ee964415c285ae140c693bc2fb94109fee121d19be2c1ad27633dac896dd6b1673a64dca42f5088d
-
SSDEEP
1536:x+2MeT1KWKE55WGMb1PpT+PWXjsnUToZbcNr1+uexCxoKV6+fNGOtOJK:xd7K9S5WGePZVjsnaoZbcNr1+bSNxtOM
Malware Config
Extracted
discordrat
-
discord_token
MTI2NDU3NjcxNjE5MDM4ODMwNA.GpIbGF.K6DwbwuTOkE9RNx3unenrnY5Hc4a8t36roOLZw
-
server_id
1264576524019830834
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource cheat.exe
Files
-
cheat.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ