Resubmissions

01-12-2024 15:26

241201-svbb7ayrek 10

01-12-2024 15:25

241201-stmntsvkhy 4

01-12-2024 15:20

241201-sqsexayqeq 10

01-12-2024 15:19

241201-sp74zayqdr 3

General

  • Target

    https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I

  • Sample

    241201-sqsexayqeq

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxMjc5OTI3NDI3NDEyNzkyMg.GOuWiR.FNWWDzhiZI-BJlCUAsWOf3Q5avMNCiFtgUWBSQ

  • server_id

    1307914676973076521

Targets

    • Target

      https://mega.nz/file/4K0wWBZZ#YX1lnHLgIRYuZPcNkOANd8JT9mPtFwxtOyFcMphV8_I

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks