General

  • Target

    incogt.exe

  • Size

    78KB

  • Sample

    241206-wd7kvazjdv

  • MD5

    a0d25e1a573c4e51f52c830846c7ca1e

  • SHA1

    496b4d3c05688ea34d36189cf80eddd1faa01600

  • SHA256

    cfec1ef46283cb7a1684eb25497607b39bcc4b6f457c7e0526105cc74dcdf348

  • SHA512

    0e092da7733b7b82ae59c4b372a51be3b0f94acffa455fef1c83f7624c8eb9ba143bc513a6f84dc12f911b15894b5cc3adbb2b286c2cdd3348c079525f1ea820

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+CPIC:5Zv5PDwbjNrmAE+uIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNDYxNDI2NjUzNTQ3NzI2OQ.GvE3OW.ygCVYZPAbul7wZgdx2a4I0nc_JUxKYOVJNdv1c

  • server_id

    1314608412302250004

Targets

    • Target

      incogt.exe

    • Size

      78KB

    • MD5

      a0d25e1a573c4e51f52c830846c7ca1e

    • SHA1

      496b4d3c05688ea34d36189cf80eddd1faa01600

    • SHA256

      cfec1ef46283cb7a1684eb25497607b39bcc4b6f457c7e0526105cc74dcdf348

    • SHA512

      0e092da7733b7b82ae59c4b372a51be3b0f94acffa455fef1c83f7624c8eb9ba143bc513a6f84dc12f911b15894b5cc3adbb2b286c2cdd3348c079525f1ea820

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+CPIC:5Zv5PDwbjNrmAE+uIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks