Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
rat (change name)(nx spoofer).rar
-
Size
26KB
-
MD5
497b629b7d2cc9aa6d6a13bbe3038855
-
SHA1
768d003890fe60918d9b1626fd37fbdbb66d2164
-
SHA256
fe6765057d6450e40490f94064a5fc0b074c62d2f6080fc1b3d8e9747c6214e8
-
SHA512
cfa2aac1f1812f8001872a2e35b151351b72636d91bca8c7cb0c132612461b2d86d54875c90dbbe8b379b7a8c1a3e9ff2c51594dee7556f475cd990526314d8f
-
SSDEEP
768:O4io33en18Sl+W6NYsJoJI0bOAKNCOgDCs:TihflqPASQ
Malware Config
Extracted
discordrat
-
discord_token
MTMxMDIyNTc5MzIzNzkwOTUyNA.GO7zwM.BLjqjzDn0kcO7VsPUa5W6XeYU7X3NlqlEDHvk8
-
server_id
1160151795734163526
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/Client-built.exe
Files
-
rat (change name)(nx spoofer).rar.rar
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ