General

  • Target

    Run.exe

  • Size

    78KB

  • Sample

    240927-frc1dswfpn

  • MD5

    af4b2ac80f5f1cdf5b67fb87918fa8f6

  • SHA1

    2d9a85401738144e01000a11d5ad16534dd7703a

  • SHA256

    0d12c936747a895675c12ae53af28352bc8a1c6fdec16aa4abf35499e5c86b94

  • SHA512

    6f9e4c481ac8678e14ce38b61c5108efade109a03b39330018bd7d3deb9a562abd89bce8ec0a60ec7ee5da592e9158f88d5a7b805997d3515b9e3d2797c2c59e

  • SSDEEP

    1536:P2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIu:PZv5PDwbjNrmAE+FIu

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4OTA4NDQ4NjAxNzA5MzY1Mg.GU9sth.3N0tTy7lqu3KMV6HV1In6GWJPFUNSX5TtpGqBs

  • server_id

    1289039707686178857

Targets

    • Target

      Run.exe

    • Size

      78KB

    • MD5

      af4b2ac80f5f1cdf5b67fb87918fa8f6

    • SHA1

      2d9a85401738144e01000a11d5ad16534dd7703a

    • SHA256

      0d12c936747a895675c12ae53af28352bc8a1c6fdec16aa4abf35499e5c86b94

    • SHA512

      6f9e4c481ac8678e14ce38b61c5108efade109a03b39330018bd7d3deb9a562abd89bce8ec0a60ec7ee5da592e9158f88d5a7b805997d3515b9e3d2797c2c59e

    • SSDEEP

      1536:P2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIu:PZv5PDwbjNrmAE+FIu

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks