General
-
Target
https://www.mediafire.com/file/lzqh7a51dbxgq1d/rat.rar/file
-
Sample
241216-cfm5faxrgs
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.mediafire.com/file/lzqh7a51dbxgq1d/rat.rar/file
Resource
win10ltsc2021-20241211-en
windows10-ltsc 2021-x64
19 signatures
300 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxODAxMTg5MDMxMTYyNjg2Mw.GL2Ywp.IrZ_8fak_Vey9qZYWp8-oA_9ozARIvdVVsg8cA
-
server_id
1318011471380353114
Targets
-
-
Target
https://www.mediafire.com/file/lzqh7a51dbxgq1d/rat.rar/file
-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1