General

  • Target

    PoabGrabber.exe

  • Size

    6.1MB

  • Sample

    241229-h71shawnaw

  • MD5

    735103629b36f00e5e0f2d366eaae44f

  • SHA1

    0c71ea959fcf6f3549ad3d7b9392157f54939bdc

  • SHA256

    7c0ea7aaa73815e7a3e7a459b567024bb418afab7a9e2b638a667e2ae331e282

  • SHA512

    f499e720129abfec0c0c5bec2cdfd0d2aac04e2e2225e1992c330332aaf317b1695903875a184d31e4a45e28d5711b2fa3b5771e7541e9a6ada3728dbfed8192

  • SSDEEP

    196608:W0umWQLVOjmFwDRxtYSHdK34kdai7bN3m2kSvW863:SwwK2pM9B3QtWi3

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyMjU3MTk2NDc1MzM4MzQzNA.Gv_tyW.c2mPpnZyoEbjQAuLnYJeYs1MlEgjP2g9Mw53Ro

  • server_id

    1322573461851471983

Targets

    • Target

      PoabGrabber.exe

    • Size

      6.1MB

    • MD5

      735103629b36f00e5e0f2d366eaae44f

    • SHA1

      0c71ea959fcf6f3549ad3d7b9392157f54939bdc

    • SHA256

      7c0ea7aaa73815e7a3e7a459b567024bb418afab7a9e2b638a667e2ae331e282

    • SHA512

      f499e720129abfec0c0c5bec2cdfd0d2aac04e2e2225e1992c330332aaf317b1695903875a184d31e4a45e28d5711b2fa3b5771e7541e9a6ada3728dbfed8192

    • SSDEEP

      196608:W0umWQLVOjmFwDRxtYSHdK34kdai7bN3m2kSvW863:SwwK2pM9B3QtWi3

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      L�>^��.pyc

    • Size

      857B

    • MD5

      9670e453426cf2c9f740a34b0c5ce9ae

    • SHA1

      ee54de4b242bf20624ff357219900a355ceb53e1

    • SHA256

      3f6372a81a6216ebdf9f03160f6cfebd447ae35462d42d0e9633eaeb1c23ed70

    • SHA512

      47bc764ab524ba846a71b4802bd39fdd8521f1ef4664c8c52956b8b1bb03ca796968c5ffc17f4e7709fb1349288724220d5c43fb1a9fecaa7a894ba1732b0b89

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.