General

  • Target

    pass_barrotes.zip

  • Size

    28KB

  • Sample

    241214-rt43fawqfm

  • MD5

    0e80f8c06cbad96ff9efab069c0ffcb8

  • SHA1

    c1aae69235526933444ac0b82007f8e9c6c0f835

  • SHA256

    a9db5789f45cd9f605968531d33c01990f6822f1b8ba966332acd5e5f8f8e980

  • SHA512

    1aa06b73c18bd65350cf7594b4922a01c6aa33f1fa509575611f5a9c98c1b231643c40695b5e336720d8ec6a07c0d20be5f15677a6fc85af62a5833800695dea

  • SSDEEP

    384:Vc+laWpqmyF2ZV5i9oOTP4hAgzoWPqdbB5z76lPW7ui+d066jW9QqXCrwMjYUMbp:VcIoiVY9ocP4hAgUfBJ76TvxSr/EUu9L

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNzE1MTMxMDMxMDY3NDQ1Mw.G4vdtT.2Xaw0SLq-8xqoRh1THgonbntua-rEIma7FhcgY

  • server_id

    1317163923350487151

Targets

    • Target

      barrotes.exe

    • Size

      78KB

    • MD5

      1adab14cec5319868d619041f47cfd76

    • SHA1

      eea3c85e94ee8b7c4473fa51ff97731a7a590d80

    • SHA256

      c9b3fcf43ef4bdae5f28d4469e810fc02e953eb540c593c8ca4bebe54cf43c10

    • SHA512

      af7b95a1cb69d84a0a3b7ab26599c265b8f816ad6eb8d9cf135eff1daa76e77a5372393959a62f08a1002550459fede1662d2774d7ff41d1b5243c93b10623c6

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+6PIC:5Zv5PDwbjNrmAE+mIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Indicator Removal: Clear Windows Event Logs

      Clear Windows Event Logs to hide the activity of an intrusion.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks