General
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0 1286237969870618677 MTI4NjIzNzk2OTg3MDYxODY3Nw.G11301.n2fmRfg0yMoTqncd4GRV3VLKsrvwaWSC7q_6LA
-
Sample
240919-ke8zhszelk
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0 1286237969870618677 MTI4NjIzNzk2OTg3MDYxODY3Nw.G11301.n2fmRfg0yMoTqncd4GRV3VLKsrvwaWSC7q_6LA
Resource
win10-20240404-en
Malware Config
Extracted
discordrat
-
discord_token
MTI4NjIzNzk2OTg3MDYxODY3Nw.G11301.n2fmRfg0yMoTqncd4GRV3VLKsrvwaWSC7q_6LA
-
server_id
1286237969870618677
Targets
-
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0 1286237969870618677 MTI4NjIzNzk2OTg3MDYxODY3Nw.G11301.n2fmRfg0yMoTqncd4GRV3VLKsrvwaWSC7q_6LA
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-