General

  • Target

    Solora Killer.exe

  • Size

    78KB

  • Sample

    241214-mr9spayrbv

  • MD5

    4d8bf7bffa89c9ca3db62884af78af09

  • SHA1

    492a1ae78843676c603bbf022563cb7264b12e31

  • SHA256

    57fbda713ffa87c2ea12b3c84f9ed507e8f77cf008a82e60c7c60b1e371495ed

  • SHA512

    4d9ffd15a22ecc2192728f760e800d9d450eb5935da7c0eb4638cbedcf1a200a7878169016301df2b15986d9135e5a511910b96e71f00fb28eed614304ce3f21

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KIPIC:5Zv5PDwbjNrmAE+dIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNzEzNDQ3MzExMjA2NDA5MA.GneNGq.QnscE7lK9wEGqXCzGFyflUQ6Yh1va0nmaaucTk

  • server_id

    1317133206973317233

Targets

    • Target

      Solora Killer.exe

    • Size

      78KB

    • MD5

      4d8bf7bffa89c9ca3db62884af78af09

    • SHA1

      492a1ae78843676c603bbf022563cb7264b12e31

    • SHA256

      57fbda713ffa87c2ea12b3c84f9ed507e8f77cf008a82e60c7c60b1e371495ed

    • SHA512

      4d9ffd15a22ecc2192728f760e800d9d450eb5935da7c0eb4638cbedcf1a200a7878169016301df2b15986d9135e5a511910b96e71f00fb28eed614304ce3f21

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KIPIC:5Zv5PDwbjNrmAE+dIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks