Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
c3d2e60a262733688a0318e00123c874
-
SHA1
68359f787a793f4c545206d912460d7333dc0d82
-
SHA256
a13bfc83deb772286914eb8e579e1a47ddab3c9e6e16215701035cb83f5ba86c
-
SHA512
cf238febc024407a24d971da2351f250a147f5a1cc72270703b09576abcd6a711bcd5a2a435d3fd565f07fcae8735ba157fbb0193f7464de760eb4917472219f
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+dPIC:5Zv5PDwbjNrmAE+NIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5OTg5NDA0MDQxNzkyNzI2MQ.GjdmNp.UwRh6Zf7dFWKmlG-__7ZWB-3mYI9TWr9kJscnY
-
server_id
1299894149222240297
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Client-built.exe
Files
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ