Resubmissions

16/04/2025, 17:20

250416-vwgayattht 10

16/04/2025, 17:17

250416-vtt41sttft 10

16/04/2025, 17:15

250416-vss6bsxps6 10

General

  • Target

    Kernel Mode.exe

  • Size

    78KB

  • Sample

    250416-vtt41sttft

  • MD5

    6119c2fd88393d762b0bfa24620b91d4

  • SHA1

    ccd132085d4756f88e7d554c671cd7ba01e38887

  • SHA256

    b62a2bcbfce49c39063720542621a36001bcacfd137ba8366b825020de82120d

  • SHA512

    a6a43cb61c18414a49fca46ed39df7c1595632753ce36a54fe9b1f9311c641a2b5af096c5add40d6ae79070760b7f9314ff8796bf1475246c7db6dfb94ddcc77

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTM1NDkyNDE2MjYxOTAxNTI2MA.GE89pU.6SDUNoquBQfG7ltjuIHlLjl_DRADwSdfVSug-c

  • server_id

    1351601990072795178

Targets

    • Target

      Kernel Mode.exe

    • Size

      78KB

    • MD5

      6119c2fd88393d762b0bfa24620b91d4

    • SHA1

      ccd132085d4756f88e7d554c671cd7ba01e38887

    • SHA256

      b62a2bcbfce49c39063720542621a36001bcacfd137ba8366b825020de82120d

    • SHA512

      a6a43cb61c18414a49fca46ed39df7c1595632753ce36a54fe9b1f9311c641a2b5af096c5add40d6ae79070760b7f9314ff8796bf1475246c7db6dfb94ddcc77

    • SSDEEP

      1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC

    • Discord RAT

      A RAT written in C# using Discord as a C2.

    • Discordrat family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks