General
-
Target
https://mega.nz/file/1bcnWbqK#l2XQ8mLHxa6bRDdEr_oqeE1fwL_2Qcs1QVMTFX33guE
-
Sample
241209-nvp35a1khk
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/1bcnWbqK#l2XQ8mLHxa6bRDdEr_oqeE1fwL_2Qcs1QVMTFX33guE
Resource
win10ltsc2021-20241023-en
windows10-ltsc 2021-x64
19 signatures
300 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNTA4ODc0MTkyMDAxNDQyNw.GFMj2_.L5t6W3b9wOyjA5wOaj6wMiABq3OXuCnXDvHMlI
-
server_id
1315089186998456320
Targets
-
-
Target
https://mega.nz/file/1bcnWbqK#l2XQ8mLHxa6bRDdEr_oqeE1fwL_2Qcs1QVMTFX33guE
-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-