General
-
Target
https://mega.nz/file/5i1UAAKT#sM8tGhXAT4lANkXVmMoFk44dq8htbAYhDQ-PkHiFy0o
-
Sample
250418-zk5avavtgy
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/5i1UAAKT#sM8tGhXAT4lANkXVmMoFk44dq8htbAYhDQ-PkHiFy0o
Resource
win10v2004-20250410-en
18 signatures
150 seconds
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTEyMDk1MzExMjkyMDg1NDU1OQ.GgKES3.CH-gWnZ5ZY4XpXnAiFted7cC94WbgTcPKDWeI0
-
server_id
1121520794992922735
Targets
-
-
Target
https://mega.nz/file/5i1UAAKT#sM8tGhXAT4lANkXVmMoFk44dq8htbAYhDQ-PkHiFy0o
-
Discordrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-