General
-
Target
Client-built.exe
-
Size
78KB
-
Sample
250331-sesarsste1
-
MD5
7943c195a125d0684b7f139d22485d30
-
SHA1
d8e99c1d9c3fc1b3d54932510e8c15ef35326610
-
SHA256
88d0b715a36832b0e69d30b180dd927800969ab1f0e3b21e584cd8033373dcca
-
SHA512
1c563a84162fed409ed9dcd5c76c031ebf03ed0309f554ff7662421412ea213d310dd01fa5e8dfa4256bfe71ca5406d759446006cb13c36b84c974d0b48befff
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20250313-en
Malware Config
Extracted
discordrat
-
discord_token
MTM1NjI4MTg2NTE3ODMxNjgyMA.GeoxaT.ocqOcSIpXr6UreUuaB7hoXHmcnhfEknTw6-SuE
-
server_id
1356279473779245056
Targets
-
-
Target
Client-built.exe
-
Size
78KB
-
MD5
7943c195a125d0684b7f139d22485d30
-
SHA1
d8e99c1d9c3fc1b3d54932510e8c15ef35326610
-
SHA256
88d0b715a36832b0e69d30b180dd927800969ab1f0e3b21e584cd8033373dcca
-
SHA512
1c563a84162fed409ed9dcd5c76c031ebf03ed0309f554ff7662421412ea213d310dd01fa5e8dfa4256bfe71ca5406d759446006cb13c36b84c974d0b48befff
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1