General

  • Target

    Solara_Bootstrapper.exe

  • Size

    18.2MB

  • Sample

    241011-cqh88swajq

  • MD5

    7278d18a763b36d38bf7fe93023ded78

  • SHA1

    37c09218dd68530f340a9ca7ba22ea902b9e0170

  • SHA256

    bcaf4581788b1e7226e769a946043978f4d26bbfe6a1bc1cd97cc5603b1f3c3c

  • SHA512

    17dd62c00479de88dd6d5b66106b8c98b485ba7ddf0fa4d8203ceaa47b63e21b60cc7a90f4b0138e96fe15b49a1869b4d49059e813dad8bbf50967ef07c25b2a

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hPIC:5Zv5PDwbjNrmAE+xIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5MzY4MTEyNTMyMjkyMDAyMg.Gr5spT.I-49BXsI6IIQnmkqZG6Ahb4dE8SoE4Hzo5-CyU

  • server_id

    1293975894108540940

Targets

    • Target

      Solara_Bootstrapper.exe

    • Size

      18.2MB

    • MD5

      7278d18a763b36d38bf7fe93023ded78

    • SHA1

      37c09218dd68530f340a9ca7ba22ea902b9e0170

    • SHA256

      bcaf4581788b1e7226e769a946043978f4d26bbfe6a1bc1cd97cc5603b1f3c3c

    • SHA512

      17dd62c00479de88dd6d5b66106b8c98b485ba7ddf0fa4d8203ceaa47b63e21b60cc7a90f4b0138e96fe15b49a1869b4d49059e813dad8bbf50967ef07c25b2a

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hPIC:5Zv5PDwbjNrmAE+xIC

MITRE ATT&CK Enterprise v15

Tasks