Behavioral task
behavioral1
Sample
DiscordXploit.exe
Resource
win7-20240903-en
General
-
Target
DiscordXploit.exe
-
Size
222KB
-
MD5
b56c44fd1623f7ece09ba38c233cffbb
-
SHA1
b4127c6a1c0b792d24edde64cd996ea23a830920
-
SHA256
6a3246d84a7dc156a06120f0d4373661743d748de6109575473adcf5071d6419
-
SHA512
2453b46f87d2a703bf48dc2f381fc6be43ba4f43d01af5f46c6d769872bec19829ca80112723d5975dc9957082d4544600b09ad852737582259bf0839c101a56
-
SSDEEP
3072:fUBcxVMWiPMV7uYH1bomQX5RJT/zNkF15g/xIoJzdIXANvoKxVY:fgWiPMVVVb7sR/z0/gfJzdIQNoKL
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:49446
8735d3c7-a86c-4a5a-b775-0b873f7eb49c
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
Files
-
DiscordXploit.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ