General

  • Target

    HWID Checker.exe

  • Size

    78KB

  • Sample

    241210-gwzwds1kbq

  • MD5

    580a5db3ec217979caa1ac20fc504f25

  • SHA1

    bae84ceed3c5962738a326879bf42a0b9d07aa6e

  • SHA256

    5bce7dbec4e5f84a3548b60cfc92db0cb12ad033a6dc1d6f4606af3aa1b55265

  • SHA512

    925f7d68b5275901edc5272eb354b54cda9ce6aea56d72dba65a78b5b9eddfeebb8329434a219eb00b2c1ac885f58975a064c6af04a84b1c28fb59ec448cc219

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIC:5Zv5PDwbjNrmAE+FIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNTgyOTU4NTc4NjQzNzY0NA.GYfgs3.ld1fBGDCSajdNinuOIM7RFm1X5IhX4xNi-p49c

  • server_id

    1315830690436349982

Targets

    • Target

      HWID Checker.exe

    • Size

      78KB

    • MD5

      580a5db3ec217979caa1ac20fc504f25

    • SHA1

      bae84ceed3c5962738a326879bf42a0b9d07aa6e

    • SHA256

      5bce7dbec4e5f84a3548b60cfc92db0cb12ad033a6dc1d6f4606af3aa1b55265

    • SHA512

      925f7d68b5275901edc5272eb354b54cda9ce6aea56d72dba65a78b5b9eddfeebb8329434a219eb00b2c1ac885f58975a064c6af04a84b1c28fb59ec448cc219

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIC:5Zv5PDwbjNrmAE+FIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks