General
-
Target
Kernel Mode.exe
-
Size
78KB
-
Sample
250416-vwgayattht
-
MD5
6119c2fd88393d762b0bfa24620b91d4
-
SHA1
ccd132085d4756f88e7d554c671cd7ba01e38887
-
SHA256
b62a2bcbfce49c39063720542621a36001bcacfd137ba8366b825020de82120d
-
SHA512
a6a43cb61c18414a49fca46ed39df7c1595632753ce36a54fe9b1f9311c641a2b5af096c5add40d6ae79070760b7f9314ff8796bf1475246c7db6dfb94ddcc77
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC
Behavioral task
behavioral1
Sample
Kernel Mode.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Kernel Mode.exe
Resource
win11-20250410-en
Malware Config
Extracted
discordrat
-
discord_token
MTM1NDkyNDE2MjYxOTAxNTI2MA.GE89pU.6SDUNoquBQfG7ltjuIHlLjl_DRADwSdfVSug-c
-
server_id
1351601990072795178
Targets
-
-
Target
Kernel Mode.exe
-
Size
78KB
-
MD5
6119c2fd88393d762b0bfa24620b91d4
-
SHA1
ccd132085d4756f88e7d554c671cd7ba01e38887
-
SHA256
b62a2bcbfce49c39063720542621a36001bcacfd137ba8366b825020de82120d
-
SHA512
a6a43cb61c18414a49fca46ed39df7c1595632753ce36a54fe9b1f9311c641a2b5af096c5add40d6ae79070760b7f9314ff8796bf1475246c7db6dfb94ddcc77
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+iPIC:5Zv5PDwbjNrmAE+OIC
-
Discordrat family
-
Modifies visibility of file extensions in Explorer
-
Modifies visiblity of hidden/system files in Explorer
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v16
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Indicator Removal
1Clear Windows Event Logs
1Modify Registry
4Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1