Resubmissions

31/03/2025, 15:21

250331-srce3svnz4 10

31/03/2025, 15:02

250331-sesarsste1 10

General

  • Target

    Client-built.exe

  • Size

    78KB

  • Sample

    250331-sesarsste1

  • MD5

    7943c195a125d0684b7f139d22485d30

  • SHA1

    d8e99c1d9c3fc1b3d54932510e8c15ef35326610

  • SHA256

    88d0b715a36832b0e69d30b180dd927800969ab1f0e3b21e584cd8033373dcca

  • SHA512

    1c563a84162fed409ed9dcd5c76c031ebf03ed0309f554ff7662421412ea213d310dd01fa5e8dfa4256bfe71ca5406d759446006cb13c36b84c974d0b48befff

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTM1NjI4MTg2NTE3ODMxNjgyMA.GeoxaT.ocqOcSIpXr6UreUuaB7hoXHmcnhfEknTw6-SuE

  • server_id

    1356279473779245056

Targets

    • Target

      Client-built.exe

    • Size

      78KB

    • MD5

      7943c195a125d0684b7f139d22485d30

    • SHA1

      d8e99c1d9c3fc1b3d54932510e8c15ef35326610

    • SHA256

      88d0b715a36832b0e69d30b180dd927800969ab1f0e3b21e584cd8033373dcca

    • SHA512

      1c563a84162fed409ed9dcd5c76c031ebf03ed0309f554ff7662421412ea213d310dd01fa5e8dfa4256bfe71ca5406d759446006cb13c36b84c974d0b48befff

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks