General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    240920-ted9ksvflr

  • MD5

    6de48dc636e876d997534aa3c5a1b368

  • SHA1

    02b08b739531593ac72dd2aa92b75e3466428b11

  • SHA256

    bbaa30ea37df3080078f35ccd41e6e1c3fe66c81d7c80dda3cf5299af988122c

  • SHA512

    23b1cdbfbc45b95e205f43e48028e5943a3a7c7c9960291e16ce34dafcb53e0e679523f30cb739bf8926355d3eb7d817d5b97c1fc722b192d9cac2925cb6380c

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WwPIC:5Zv5PDwbjNrmAE+W0IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4NjcwOTYwMTQwNzg2MDc3Nw.GdbB5d.SstzGRfJxvsS7oS6I1M3fQK9g8R5_he-FnX100

  • server_id

    1286709234360385586

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      6de48dc636e876d997534aa3c5a1b368

    • SHA1

      02b08b739531593ac72dd2aa92b75e3466428b11

    • SHA256

      bbaa30ea37df3080078f35ccd41e6e1c3fe66c81d7c80dda3cf5299af988122c

    • SHA512

      23b1cdbfbc45b95e205f43e48028e5943a3a7c7c9960291e16ce34dafcb53e0e679523f30cb739bf8926355d3eb7d817d5b97c1fc722b192d9cac2925cb6380c

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WwPIC:5Zv5PDwbjNrmAE+W0IC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks