Resubmissions

11-11-2024 03:36

241111-d53f4avqdq 10

11-11-2024 02:51

241111-db8e9a1fqh 10

General

  • Target

    e0f3358ba194d38383fad9c02c67c74db0de2b1de62031bcca475f4e58154d9b

  • Size

    3.5MB

  • Sample

    241111-db8e9a1fqh

  • MD5

    b659ae263510522b8d1bbc2c843a59aa

  • SHA1

    a8cb4eeaed0c678f070573258ba766bf2ff3bf99

  • SHA256

    e0f3358ba194d38383fad9c02c67c74db0de2b1de62031bcca475f4e58154d9b

  • SHA512

    c9a8dd1d6a6b2bf4d5553efafc0e3b864141443d7914cb71cf9c8b96ed45787d06bef0a4d41b6dcdf0ebcf400c2c0e6890a70964404a4977d7b26cb75436793d

  • SSDEEP

    49152:wDjlabwz9WftVELfwDeMwHJ0n/QBQqlxCCBfjASi93532w+eAWsQQpOpydN0FWVu:QqwYfYq4zlpfjS1MWsjcWNp9tn38f

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwNTIzNjAyOTQ0MzQwNzkyMg.GruaeT.YnRJjugEne-8ueplgAjqzDORIFDIjXMQyzKlZ4

  • server_id

    1305235751331430410

Targets

    • Target

      e0f3358ba194d38383fad9c02c67c74db0de2b1de62031bcca475f4e58154d9b

    • Size

      3.5MB

    • MD5

      b659ae263510522b8d1bbc2c843a59aa

    • SHA1

      a8cb4eeaed0c678f070573258ba766bf2ff3bf99

    • SHA256

      e0f3358ba194d38383fad9c02c67c74db0de2b1de62031bcca475f4e58154d9b

    • SHA512

      c9a8dd1d6a6b2bf4d5553efafc0e3b864141443d7914cb71cf9c8b96ed45787d06bef0a4d41b6dcdf0ebcf400c2c0e6890a70964404a4977d7b26cb75436793d

    • SSDEEP

      49152:wDjlabwz9WftVELfwDeMwHJ0n/QBQqlxCCBfjASi93532w+eAWsQQpOpydN0FWVu:QqwYfYq4zlpfjS1MWsjcWNp9tn38f

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Downloads MZ/PE file

    • Event Triggered Execution: Image File Execution Options Injection

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks