Behavioral task
behavioral1
Sample
Spoofer/Hardware Spoofer.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Spoofer/Hardware Spoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
Spoofer.rar
-
Size
26KB
-
MD5
30b828bcfa30479a2e402e46f8f1d262
-
SHA1
10088f9e7d17500ad625bee9a1d64a850faa5f5a
-
SHA256
84b7efd2c244173234ba7208bf38d432462fa958b40ceefedff524f089b6e208
-
SHA512
5fa9cb21ebfcc33092daeeb4068f12180ef80dbb672892280c49798607248cb6b330f02aa0957a72543d9f44c2e0d7d16a715534495e80cd532673267b3fbe4a
-
SSDEEP
768:tsxlp39QDgU2y47hmTmu0A66GItHakbbCW0/P:2XpNQkUWtmTmu96jk1g
Malware Config
Extracted
discordrat
-
discord_token
MTExODY1MTM0MDY5MjkzMDU4MA.GyYPbd.gv_mSClOMYmZ_EMjVhy1iGJpGBV4mylJ_ARxXk
-
server_id
1118654792068251759
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/Spoofer/Hardware Spoofer.exe
Files
-
Spoofer.rar.rar
-
Spoofer/Hardware Spoofer.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
Spoofer/README.txt