General
-
Target
https://gofile.io/d/pHSQ9S
-
Sample
241123-k14xpaslaw
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/pHSQ9S
Resource
win10v2004-20241007-en
windows10-2004-x64
17 signatures
300 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMwOTc3OTA0NDc1NzQwOTc5Mg.GqRjHM.OrOqdkb_0kY0TAalo3nn0l0anYPKxq5LviVRiA
-
server_id
1309037779530940456
Targets
-
-
Target
https://gofile.io/d/pHSQ9S
-
Discordrat family
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-