General

  • Target

    home

  • Size

    51KB

  • Sample

    250101-zp8h3atncx

  • MD5

    c05f8101788ba9d2b1bccb030bf3aaea

  • SHA1

    bc8ca9aebf099a85ad40115706556aa7f14e97b8

  • SHA256

    d4de979321fdd1346ca9b9b837edd4f88ff94da69d61f08babc33c60f602e144

  • SHA512

    73e5ba21321be3404358e491a98737c5e7b9865b5ec38dac90e876f3d6a7a2f9df245430dfe5117af8ec0a276318dad86fd918a264ceb26ecf8a582a18b09f83

  • SSDEEP

    768:88kNWKwvxAESwezl8kNWP8AqjkbTMyUcY0dYzfn8b5:886WK1/86WBqjkbTMLidAf8b5

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyNDExODIwNDM4MTEzNDkwMA.GraJ7V.xNuemyWdlO3nJTqa9oT0mOOFHljD0SQUtIWe_Q

  • server_id

    1324118276779016263

Targets

    • Target

      home

    • Size

      51KB

    • MD5

      c05f8101788ba9d2b1bccb030bf3aaea

    • SHA1

      bc8ca9aebf099a85ad40115706556aa7f14e97b8

    • SHA256

      d4de979321fdd1346ca9b9b837edd4f88ff94da69d61f08babc33c60f602e144

    • SHA512

      73e5ba21321be3404358e491a98737c5e7b9865b5ec38dac90e876f3d6a7a2f9df245430dfe5117af8ec0a276318dad86fd918a264ceb26ecf8a582a18b09f83

    • SSDEEP

      768:88kNWKwvxAESwezl8kNWP8AqjkbTMyUcY0dYzfn8b5:886WK1/86WBqjkbTMLidAf8b5

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks