General

  • Target

    trojan.py

  • Size

    15KB

  • Sample

    240826-qxzfpaxfpm

  • MD5

    bc9ae5f0b94e2b380421027f89b7413b

  • SHA1

    e336eb7c248b3bf2a8f453b9db58795551bc0f72

  • SHA256

    b7edf054bc4923240bac135058249de85b62184ee75bdbd68bae0e380e1420bf

  • SHA512

    f7b45a64df3357ea144ab0e2dc1408f2b00b880ef39853f15e0929cd8225eae0eabf3b28197970af925cff763793cf806865c263470f31f02b27676d4374e133

  • SSDEEP

    192:TWNLqfvfdFBru8jlhnUqX/X9yCLIOYUj9EXRsmsatvKl0LO0:hDpjlhUM9j9EXPtvKD0

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3NjczNTc4MzM5MDE1MDcxNw.Gucx-l.1ksiq-PyzVjusluKhzfCIJPQoDWzqOajnWtLwk

  • server_id

    1275570590962683925

Targets

    • Target

      trojan.py

    • Size

      15KB

    • MD5

      bc9ae5f0b94e2b380421027f89b7413b

    • SHA1

      e336eb7c248b3bf2a8f453b9db58795551bc0f72

    • SHA256

      b7edf054bc4923240bac135058249de85b62184ee75bdbd68bae0e380e1420bf

    • SHA512

      f7b45a64df3357ea144ab0e2dc1408f2b00b880ef39853f15e0929cd8225eae0eabf3b28197970af925cff763793cf806865c263470f31f02b27676d4374e133

    • SSDEEP

      192:TWNLqfvfdFBru8jlhnUqX/X9yCLIOYUj9EXRsmsatvKl0LO0:hDpjlhUM9j9EXPtvKD0

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks