General
-
Target
https://github.com/moom825/Discord-RAT-2.0
-
Sample
241213-sa76estmaq
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0
Resource
win10v2004-20241007-en
windows10-2004-x64
18 signatures
300 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNzE0MzU4ODEyNzI0NDMwOA.G80dRA.WUpHnFSH_E6zLR1BhYABX1tYHkY-s6r2tuF2X8
-
server_id
1315723476291555339
Targets
-
-
Target
https://github.com/moom825/Discord-RAT-2.0
-
Discordrat family
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-