Resubmissions

10-10-2024 22:45

241010-2prxeswcmj 10

10-10-2024 22:13

241010-15bppsvcqj 10

General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    241010-15bppsvcqj

  • MD5

    e8e307d2a0e8b33878dea7396f1fe7fe

  • SHA1

    4abea5f3288c4045a68d2d355838533d72768e69

  • SHA256

    0a188431ec4ef4275ebe8377963a65e82d9a1fbc9a72c9047ccc6fe65d30b837

  • SHA512

    c8b50c57b9ac2c3a73a8256a85b74d8ab599c5415148f48ee902f0965bd0c2e7fa91756cd12f491be093058fbf57cb20fca59bd71303147ebbbb36515b82f774

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5NDA0NTgxMjIxMjQ5ODQ1Mg.G2NcYi.AGgJbkkw4ihNbkFwsXZwuwi-qjW6NEuR8lVozM

  • server_id

    1294045594666668093

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      e8e307d2a0e8b33878dea7396f1fe7fe

    • SHA1

      4abea5f3288c4045a68d2d355838533d72768e69

    • SHA256

      0a188431ec4ef4275ebe8377963a65e82d9a1fbc9a72c9047ccc6fe65d30b837

    • SHA512

      c8b50c57b9ac2c3a73a8256a85b74d8ab599c5415148f48ee902f0965bd0c2e7fa91756cd12f491be093058fbf57cb20fca59bd71303147ebbbb36515b82f774

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Disables Task Manager via registry modification

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Sets desktop wallpaper using registry

MITRE ATT&CK Enterprise v15

Tasks