Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
b9c729fffb81da8881620157b584d262
-
SHA1
9f19a6f5f161d0fb32b360aa85ca07de056943ca
-
SHA256
9c7f793fca4094ae0db100d17e225e5ede1a84e1276211e7f645c8236fed3e31
-
SHA512
d1d3bbde5771b88ac764aa1861763c397dfb0f62703072c0a7e09638c1f20665bc23dc08b8dce1a950c7aa37490543323c580554c86e457d1a172b7c4122268d
-
SSDEEP
1536:y2WjO8XeEXFt5P7v88wbjNrfxCXhRoKV6+V+JPIC:yZD5PDwbjNrmAE+5IC
Malware Config
Extracted
discordrat
-
discord_token
https://discord.com/oauth2/authorize?client_id=1332732341881278658&permissions=8&integration_type=0&scope=bot
-
server_id
1332736570473709631
Signatures
-
Discordrat family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Client-built.exe
Files
-
Client-built.exe.exe windows:4 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ