General

  • Target

    SynapseZ.exe

  • Size

    78KB

  • Sample

    241228-th713ayrhw

  • MD5

    ff4f53a40d6a36e2229dabdf8ebf8783

  • SHA1

    24dee4eac38ef44f23a4c62a302df1a79ac915a2

  • SHA256

    69905033a2fcc7f0a7cfc61144662aec065747b7de7ab058bcd31ccf17141f78

  • SHA512

    c8f449aaecbc2dfe26b11beab9ff2cba60b085561f01a42b7a4e0aa82ff218218a2443c522b4e13b67c329a0cb57a9cf2ee9f12f44996f8793f06f68506f1164

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+k0PIC:5Zv5PDwbjNrmAE+koIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyMjU0NDU1ODc4OTA5OTU5NA.GWlmrO.9e2PL6twD23RSJ7qs004Hme_hrJkg2H5IxHDA8

  • server_id

    1320699635127550014

Targets

    • Target

      SynapseZ.exe

    • Size

      78KB

    • MD5

      ff4f53a40d6a36e2229dabdf8ebf8783

    • SHA1

      24dee4eac38ef44f23a4c62a302df1a79ac915a2

    • SHA256

      69905033a2fcc7f0a7cfc61144662aec065747b7de7ab058bcd31ccf17141f78

    • SHA512

      c8f449aaecbc2dfe26b11beab9ff2cba60b085561f01a42b7a4e0aa82ff218218a2443c522b4e13b67c329a0cb57a9cf2ee9f12f44996f8793f06f68506f1164

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+k0PIC:5Zv5PDwbjNrmAE+koIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks