General

  • Target

    Eac.exe

  • Size

    35KB

  • Sample

    250301-acc4ysszas

  • MD5

    d5affa7d70893d1d29f8d2d0e8e49499

  • SHA1

    0ffe0701303974ef2edd8638abf92a86648e1b68

  • SHA256

    fc4c55249b5a21fdc781db6f092f7a311524ff88db4751f7b3b5f70f66211fdc

  • SHA512

    7361d3ef71a514766538d9b17b6d3c21f4ace1c90a2b102d3729ac3844b72104621267445e162d54201b2341e2f2a7da0e791804b6c0804149fdd1152578044f

  • SSDEEP

    768:GhvFDyd1WrXkxINeeXJMmA2K3kqgjPQ1YeIqC33QBI:Wxyd87kxVeXJMmA2K3ktjwYeLB

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxODM5MDk2Mzc1NTk0NjEwNQ.GMbt-o.TS0FjWTfQgQvuTYGA3oI5R4a4Nq2WGb7J8TJCA

  • server_id

    1328216936206831626

Targets

    • Target

      Eac.exe

    • Size

      35KB

    • MD5

      d5affa7d70893d1d29f8d2d0e8e49499

    • SHA1

      0ffe0701303974ef2edd8638abf92a86648e1b68

    • SHA256

      fc4c55249b5a21fdc781db6f092f7a311524ff88db4751f7b3b5f70f66211fdc

    • SHA512

      7361d3ef71a514766538d9b17b6d3c21f4ace1c90a2b102d3729ac3844b72104621267445e162d54201b2341e2f2a7da0e791804b6c0804149fdd1152578044f

    • SSDEEP

      768:GhvFDyd1WrXkxINeeXJMmA2K3kqgjPQ1YeIqC33QBI:Wxyd87kxVeXJMmA2K3ktjwYeLB

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks