General

  • Target

    McForceOp.exe

  • Size

    78KB

  • Sample

    241008-j2wr2azhpf

  • MD5

    505e0aaa6fd221a88555f235fda98267

  • SHA1

    14eda24cc513664e6df47232c678df1c0e5bc43a

  • SHA256

    094e3c75502b5f41db0d7449fa08b0afcd4043cfb43fc2cb0ec849815802c845

  • SHA512

    a24d1ab43b19f1ea3d66b12799dce3b5567791fe612c6cdfb0a7ddd27287e55c9443f3a3bacaa9bf2794550437088940247bb37618110f0f39707434b03151d8

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+DPIC:5Zv5PDwbjNrmAE+bIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3NzUzNTg3MzYxMjY0NDQ3NA.Gq6rfp.9RlUKcMk31okJxZ2Dykafs1b9vfFyq-ZQTfTrU

  • server_id

    1287401873288073236

Targets

    • Target

      McForceOp.exe

    • Size

      78KB

    • MD5

      505e0aaa6fd221a88555f235fda98267

    • SHA1

      14eda24cc513664e6df47232c678df1c0e5bc43a

    • SHA256

      094e3c75502b5f41db0d7449fa08b0afcd4043cfb43fc2cb0ec849815802c845

    • SHA512

      a24d1ab43b19f1ea3d66b12799dce3b5567791fe612c6cdfb0a7ddd27287e55c9443f3a3bacaa9bf2794550437088940247bb37618110f0f39707434b03151d8

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+DPIC:5Zv5PDwbjNrmAE+bIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks