General

  • Target

    vison.exe

  • Size

    708KB

  • Sample

    241111-bagvssskdn

  • MD5

    51d6819e3fb246c54b31fe8aff8627c0

  • SHA1

    d0b0790c2ec591684ae72588d0aa8d68642a1e4a

  • SHA256

    34bd1f86f1c5c37a2200160019e828a16b1d2efa333099814a6c51c075bfd349

  • SHA512

    c1db0d56c936a079b80cabfbbaec3fc042dea6b765283cb1481193dc05dc55ca313b71d1847935c741672d7bb63e9acef2bbbead4b5b9c5c389c6191ae71f080

  • SSDEEP

    12288:PLMEalqxXblqoRX5qbfphLxaOS3CPqv0Ra6CgLc4rvGSlEkK3dHsZix:DqaXNabfphLxaVSPqvca6COBlaldx

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwNTIyNjM4MTE3MjY3MDQ5NA.GefVhh.4NM9q0Xf2sO6mHqumTUxU-PopzLhDvRYkm6O3A

  • server_id

    1290828168563003412

Targets

    • Target

      vison.exe

    • Size

      708KB

    • MD5

      51d6819e3fb246c54b31fe8aff8627c0

    • SHA1

      d0b0790c2ec591684ae72588d0aa8d68642a1e4a

    • SHA256

      34bd1f86f1c5c37a2200160019e828a16b1d2efa333099814a6c51c075bfd349

    • SHA512

      c1db0d56c936a079b80cabfbbaec3fc042dea6b765283cb1481193dc05dc55ca313b71d1847935c741672d7bb63e9acef2bbbead4b5b9c5c389c6191ae71f080

    • SSDEEP

      12288:PLMEalqxXblqoRX5qbfphLxaOS3CPqv0Ra6CgLc4rvGSlEkK3dHsZix:DqaXNabfphLxaVSPqvca6COBlaldx

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks