Behavioral task
behavioral1
Sample
zorara.exe
Resource
win10v2004-20241007-en
General
-
Target
zorara.exe
-
Size
78KB
-
MD5
cf871781917302521c076c9fb183a92b
-
SHA1
677e7aa6f044e7d04afe34b5276f2836e623d959
-
SHA256
9b2310215dc194404e34a204e0331e30dba68b7bbb3783d3a7c7fc41552d3eed
-
SHA512
2dbcf6f42954f981da3f95079aef5299089f12e1e4c6ba7901b612c778b11dfeafba15f7bca62fb8d18a1e71e9ba7675037600adfc4f6db7234afe7fde60a304
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5NDAwNTY0OTIxODIwNzc2Ng.GPszTg.D8KTKB3_qLN0rn3XqvePMm8SzSDKIiDeKse1Ec
-
server_id
1293999282432774195
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource zorara.exe
Files
-
zorara.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ