Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
976cab2ebf7feeca8bb2e878173bbd75
-
SHA1
cfc7ff003e2e02fd2d07ef9d599ad98fdd17e57d
-
SHA256
f69ca83bc820f2e899c064d358911cfe8629cd150a27a923bcd3100f0fd1d6bf
-
SHA512
ea65fd479795472344dd0564f605cb9ae64df75c5becbf545642414040a2dd5df59d9112280e304ce06207178fc5229056615ac3251efbee5b1308a218aa2d91
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hrPIC:5Zv5PDwbjNrmAE+hDIC
Malware Config
Extracted
discordrat
-
discord_token
MTMwNTEzMTAyNTE3MjUyOTI1NA.GRlgAe.qVBCGGPv5rU4uSU-RPVy0ngEUAvRwwx1LrJqZA
-
server_id
1305129586971119626
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Client-built.exe
Files
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ