General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    250110-wb3twatmbm

  • MD5

    4a3ad9a17023d32b70d14c88747b0302

  • SHA1

    a24fdb9e259d5db66a00aa392aea4b146a697787

  • SHA256

    45e83d1277abd0a69f5a33f0cc20c51f804bbd26e9a0686117247ad4f27ed81a

  • SHA512

    ee86349f849c0edf7a1c1080f71e12e8c659c6cffec168a3e6da5eaf52f9ecac69d0b2b7c01d69e282d6f44ad890cf60f080fd11b425fb93a74e0b7218d6070b

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyNzMxODAyNTIyMDkxNTIyMA.Gbhmly.2VnF8G_nnJt-kiY3NLK0toQR92qky0l7vAaT4Y

  • server_id

    1327319098295582744

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      4a3ad9a17023d32b70d14c88747b0302

    • SHA1

      a24fdb9e259d5db66a00aa392aea4b146a697787

    • SHA256

      45e83d1277abd0a69f5a33f0cc20c51f804bbd26e9a0686117247ad4f27ed81a

    • SHA512

      ee86349f849c0edf7a1c1080f71e12e8c659c6cffec168a3e6da5eaf52f9ecac69d0b2b7c01d69e282d6f44ad890cf60f080fd11b425fb93a74e0b7218d6070b

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks