Resubmissions

12-10-2024 03:46

241012-ebxt7awcpm 10

12-10-2024 03:33

241012-d4fwps1cne 7

12-10-2024 03:32

241012-d347xavgqj 8

12-10-2024 03:32

241012-d3m9dsvgnl 7

General

  • Target

    2024-10-12_37e70a501e43c8f4beb5ead5537b217c_cryptolocker

  • Size

    48KB

  • Sample

    241012-ebxt7awcpm

  • MD5

    37e70a501e43c8f4beb5ead5537b217c

  • SHA1

    1258c1a191d81f9cc473690ef0c43d8d26ff29a5

  • SHA256

    a01e5c559ca7fc149420a26d46f13575b3e01daa19f2bdea0d9723c04ea1db35

  • SHA512

    7459d4787848912f1eba0749298952011df4e8696581b2cddc9af918605203b0b5c3e0f7f6e87c669a6fa70dae3d0b0d99ce2fca821928124d4603eaf0c0d82d

  • SSDEEP

    768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPcV:P6QFElP6k+MRQMOtEvwDpjBQpVX1

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    e0b247b33471266e4979b7a47ac6216485db234bf65c6745868e4305fddfc4fc

  • server_id

    1292952194571702272

Targets

    • Target

      2024-10-12_37e70a501e43c8f4beb5ead5537b217c_cryptolocker

    • Size

      48KB

    • MD5

      37e70a501e43c8f4beb5ead5537b217c

    • SHA1

      1258c1a191d81f9cc473690ef0c43d8d26ff29a5

    • SHA256

      a01e5c559ca7fc149420a26d46f13575b3e01daa19f2bdea0d9723c04ea1db35

    • SHA512

      7459d4787848912f1eba0749298952011df4e8696581b2cddc9af918605203b0b5c3e0f7f6e87c669a6fa70dae3d0b0d99ce2fca821928124d4603eaf0c0d82d

    • SSDEEP

      768:P6LsoEEeegiZPvEhHS5+Mh/QtOOtEvwDpjBpaD3TUogs/VXpAPcV:P6QFElP6k+MRQMOtEvwDpjBQpVX1

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks