Behavioral task
behavioral1
Sample
DiscordXploit.exe
Resource
win7-20240729-en
General
-
Target
DiscordXploit.rar
-
Size
115KB
-
MD5
ce7557476eb42db6fd3753dad8db44f0
-
SHA1
b0095dc373ee2635cdede710178d011e8e7cd76f
-
SHA256
ba2f01e1b6ebd5e55a11c5164a0b11bde34fe42135d0d81a9c228990abc886a1
-
SHA512
5f346ebdcefc57b6afdaa393abcdb31c3153919dc54af6c1417fdcdd41200446a6b84fe24b58bf9c0b47788eb3d93faf68b31eb77532059cdeb0f20ac084b7c6
-
SSDEEP
3072:6hgtxr1GXkkui0nI1nmaWqVR1Yy+VfmbUYz4C1yDotNV:ft91ykkX0omt2AYp1yDi7
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
193.161.193.99:49446
8735d3c7-a86c-4a5a-b775-0b873f7eb49c
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule static1/unpack001/DiscordXploit.exe family_asyncrat -
Asyncrat family
-
resource yara_rule static1/unpack001/DiscordXploit.exe VenomRAT -
Venomrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/DiscordXploit.exe
Files
-
DiscordXploit.rar.rar
-
DiscordXploit.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
Imports
mscoree
_CorExeMain
Sections
.text Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ