General

  • Target

    https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip

  • Sample

    250116-z36avszngq

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwMzEwMTk0OTA5MjE2Nzc1MQ.GwktDD.gTu7k-KT7sMDbdmIhC3e7HBbptPiY-XbXwNeUU

  • server_id

    1303101949092167751

Targets

    • Target

      https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Drops file in System32 directory

    • Sets desktop wallpaper using registry

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks