General

  • Target

    discordratclient.exe

  • Size

    78KB

  • Sample

    240917-xw6xpszemm

  • MD5

    968fd8c1b9fbbe9345e4c14357ab015f

  • SHA1

    22d4f725fea9cc804a094132edbbb472326ffaa3

  • SHA256

    08bd10bde0879c2bc0f72a4f1be106237b3e15dae52897454fa69bd036cecb05

  • SHA512

    fb7f220e25c9dd22922ddd578a961c8144d08097f6575b075d8f6b66146da55959e34e332dec4ff64e987cddf909ff5c6c9a54c9b802a8690224edce930d3d25

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+/PIC:5Zv5PDwbjNrmAE+HIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4NTU4ODM5MDc1ODE5MTIzNQ.GwW9id.kiyuRUJzPrMsV4YY0PXjxpwWhqeWLNrB1F_Voo

  • server_id

    1285585473472958475

Targets

    • Target

      discordratclient.exe

    • Size

      78KB

    • MD5

      968fd8c1b9fbbe9345e4c14357ab015f

    • SHA1

      22d4f725fea9cc804a094132edbbb472326ffaa3

    • SHA256

      08bd10bde0879c2bc0f72a4f1be106237b3e15dae52897454fa69bd036cecb05

    • SHA512

      fb7f220e25c9dd22922ddd578a961c8144d08097f6575b075d8f6b66146da55959e34e332dec4ff64e987cddf909ff5c6c9a54c9b802a8690224edce930d3d25

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+/PIC:5Zv5PDwbjNrmAE+HIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks