General

  • Target

    cookie gr4bber.exe

  • Size

    78KB

  • Sample

    241230-xfjr8stlfk

  • MD5

    0747b9a3dd24706bda9830106608cd6a

  • SHA1

    505d31f334ef718487765eb51625665a16b55d62

  • SHA256

    9703da72a1327e34d5c607746a69f0be96813ca34479ee08cada4ac2bb7ea367

  • SHA512

    8a1d42e27d3a7dd058604d0f4a1642840132ae97408acd4374518dedc61fc0a2f189964ac5c6665d72a62236c8f5a2da37a8a63c479776a2bc44619b1ce8d4e2

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+5PIC:5Zv5PDwbjNrmAE+JIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyMjkyMTM0NzEwNTU1NDQ3NA.G7_d7r.iHTBAwbhT0TxJl-tFfpdojbnLGiugDpc-w0oXs

  • server_id

    1322920245907820584

Targets

    • Target

      cookie gr4bber.exe

    • Size

      78KB

    • MD5

      0747b9a3dd24706bda9830106608cd6a

    • SHA1

      505d31f334ef718487765eb51625665a16b55d62

    • SHA256

      9703da72a1327e34d5c607746a69f0be96813ca34479ee08cada4ac2bb7ea367

    • SHA512

      8a1d42e27d3a7dd058604d0f4a1642840132ae97408acd4374518dedc61fc0a2f189964ac5c6665d72a62236c8f5a2da37a8a63c479776a2bc44619b1ce8d4e2

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+5PIC:5Zv5PDwbjNrmAE+JIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks