C:\Users\EnderPearl\Downloads\Discord-RAT-2.0-master\Discord-RAT-2.0-master\Discord rat\obj\Debug\Bootsrapper.pdb
Behavioral task
behavioral1
Sample
Bootsrapper.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Bootsrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
Bootsrapper.exe
-
Size
90KB
-
MD5
7eab793cd27c58b8c563d6a33a2f2a72
-
SHA1
24fc9a75389b6c115fff236ebd979264b0fd8f30
-
SHA256
6b8f247e784b698beb5f367db3e0d5f3948bf197dcbcf6d5ea16d4a08f0318fb
-
SHA512
f4d0c2f8c9fd9ba76a716b5eeab2e1db28235080a5b2822f3453567a1ec51347697edf859687393094332e2c01d5dc8667170cb4e4731b50afd79da14ee92e8e
-
SSDEEP
1536:IjvCBPyCGZ6wIopPAAqxhP51UGIfpAk0Wjgb2Nrs+uexCxoKV6+f3ky:WCBKCGZ1IoNUhP5qnRgb2Nrs+bS3ky
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTg4MDE2NTE2OTYzMTI1Mw.G_7Dxh.wsYSjBrol4khGDtnY_BBpyEe - H9AsmG2TfF5gs
-
server_id
1309880651683467275
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource Bootsrapper.exe
Files
-
Bootsrapper.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ