General
-
Target
Built.exe
-
Size
5.9MB
-
Sample
250217-se4nsszmdp
-
MD5
e50b094baefe8750754bbf9476c71ef9
-
SHA1
771fcf57f5942ca2c5420886433384822d6ddcc3
-
SHA256
f9d11d2df1ed2b41dbd570b2460661a7a006920529d62ed245556c25b5dbdd7c
-
SHA512
47fc5802fcf5bd4b7e09df72a021a2876c447dc0584d56faeb11f63b8263caf7a3c6613eb622e1196c36cb87a1cceee1906150bd2743a7fe1d9c0a7a8930002e
-
SSDEEP
98304:Qvu+EYYIhBi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFc9hmkrTto:iEPIjDOYjJlpZstQoS9Hf12VKXrbmC3S
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
discordrat
-
discord_token
MTMzMzg4MTM4OTc3ODczMTE2MQ.GTLT1o.skWmespdKQInOQVEu5pextJw_a1Ajr4YImyEAE
-
server_id
1340793825077104640
Targets
-
-
Target
Built.exe
-
Size
5.9MB
-
MD5
e50b094baefe8750754bbf9476c71ef9
-
SHA1
771fcf57f5942ca2c5420886433384822d6ddcc3
-
SHA256
f9d11d2df1ed2b41dbd570b2460661a7a006920529d62ed245556c25b5dbdd7c
-
SHA512
47fc5802fcf5bd4b7e09df72a021a2876c447dc0584d56faeb11f63b8263caf7a3c6613eb622e1196c36cb87a1cceee1906150bd2743a7fe1d9c0a7a8930002e
-
SSDEEP
98304:Qvu+EYYIhBi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFc9hmkrTto:iEPIjDOYjJlpZstQoS9Hf12VKXrbmC3S
-
Discordrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-