Behavioral task
behavioral1
Sample
VanishRaider.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VanishRaider.exe
Resource
win10v2004-20241007-en
General
-
Target
VanishRaider.exe
-
Size
78KB
-
MD5
9e4076a3fbfa1f3ecb81058ef4001fdd
-
SHA1
541296e7975cbdd435b4541ed3874de72dadac94
-
SHA256
66de5621d581e9a00c389c264e20ca0e7b46ec943dc7a3763fffe12a5a10ddaf
-
SHA512
069ba11a3709de05f3e196e709c99e5f3955fb431bf23c1128ee07b285e5b3906e618ae1e1e9704f6466d2c5e1bca9c1ae225aa2eda5ab10d51c34a8a1b47066
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTI4ODkwNzg5ODAzODI1NTcwOA.GgUucJ.D2rA49_EiGu77vh25hJjBiyYWeQreSfEVcBYTU
-
server_id
1287079655723106437
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource VanishRaider.exe
Files
-
VanishRaider.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ