Resubmissions

14-10-2024 13:35

241014-qv4bvssbpr 10

General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    241014-qv4bvssbpr

  • MD5

    1d314f1fc8fae5c78a202bec555064bf

  • SHA1

    c8b4c16f29bdc357052a1e35b5129c788de30f15

  • SHA256

    82732970819d94679571bd75e125145f248f53da7b9a1610c2c8e15723e9a568

  • SHA512

    0484e39eafdcc0a9f7783f9f19286c6410281826cc067e5bfd8940033d29e69c1e0ab5b1b6f8ce432ffa516e4a6ce8bc00ad06854c52d7102b1363ee546fcc6a

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5NTMzNzg4MDY3MTA5Mjc0Nw.GtMwkk.5Wt5mYxAlm7wuZHi-xyeGjfs8FGFRwJHrIkZ6I

  • server_id

    1295337779596759112

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      1d314f1fc8fae5c78a202bec555064bf

    • SHA1

      c8b4c16f29bdc357052a1e35b5129c788de30f15

    • SHA256

      82732970819d94679571bd75e125145f248f53da7b9a1610c2c8e15723e9a568

    • SHA512

      0484e39eafdcc0a9f7783f9f19286c6410281826cc067e5bfd8940033d29e69c1e0ab5b1b6f8ce432ffa516e4a6ce8bc00ad06854c52d7102b1363ee546fcc6a

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Abuse Elevation Control Mechanism: Bypass User Account Control

      UAC Bypass Attempt via SilentCleanup Task.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks