Click to jump to signature section
Source: 18.ip.gl.ply.gg | Avira URL Cloud: Label: malware |
Source: C:\Users\user\AppData\Roaming\Discord.exe | Avira: detection malicious, Label: TR/Dropper.Gen |
Source: Discord.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "18.ip.gl.ply.gg,", "Ports": "6606,7707,8808,9028", "Version": "0.5.8", "Autorun": "true", "Install_Folder": "Discord.exe", "Install_File": "RUQ5NjdZYkk3M3E5aFYwVkJCR0ZkQjlqc2lEcExuOGc="} |
Source: C:\Users\user\AppData\Roaming\Discord.exe | ReversingLabs: Detection: 89% |
Source: Discord.exe | ReversingLabs: Detection: 89% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: C:\Users\user\AppData\Roaming\Discord.exe | Joe Sandbox ML: detected |
Source: Discord.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Discord.exe | Static PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: 18.ip.gl.ply.gg |
Source: Malware configuration extractor | URLs: |
Source: Yara match | File source: Discord.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED |
Source: global traffic | TCP traffic: 192.168.2.4:49732 -> 147.185.221.18:7707 |
Source: Joe Sandbox View | IP Address: 147.185.221.18 147.185.221.18 |
Source: Joe Sandbox View | ASN Name: SALSGIVERUS SALSGIVERUS |
Source: unknown | TCP traffic detected without corresponding DNS query: 173.222.162.32 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | TCP traffic detected without corresponding DNS query: 199.232.214.172 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: 18.ip.gl.ply.gg |
Source: Discord.exe, 00000000.00000002.1731807083.0000000002C71000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: unknown | Network traffic detected: HTTP traffic on port 49675 -> 443 |
Source: Yara match | File source: Discord.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR |
Source: Yara match | File source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED |
Source: Discord.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: Discord.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000007.00000002.2949588314.00000000027FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000002.1731807083.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: Discord.exe PID: 2108, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Discord.exe, 00000000.00000000.1684289899.000000000082E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs Discord.exe |
Source: Discord.exe, 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs Discord.exe |
Source: Discord.exe | Binary or memory string: OriginalFilenameStub.exe" vs Discord.exe |
Source: Discord.exe.0.dr | Binary or memory string: OriginalFilenameStub.exe" vs Discord.exe |
Source: Discord.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: Discord.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: Discord.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.Discord.exe.820000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.2.Discord.exe.2ca3d1c.0.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.2.Discord.exe.2ca3d1c.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000000.1684266367.0000000000822000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000000.00000002.1731807083.0000000002CA3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000007.00000002.2949588314.00000000027FC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000002.1731807083.0000000002B61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: Discord.exe PID: 7148, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: Discord.exe PID: 2108, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: C:\Users\user\AppData\Roaming\Discord.exe, type: DROPPED | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Discord.exe, Settings.cs | Base64 encoded string: 'JQKmmiOaY+Mgh8iuvfMjtIQJMipBJws+gNta2M1ZQbBasT3P4obWWXOYyydNYzRqnxGuzU9d9X/b4iBxQQfut1zAywR81fJHLpjUsY8xv1w=', 'mixPQrpXdTG9MhKe2E8S7PqEPNQ3DN9uhmv8XD9tH8dI/FP6r1cA2RXOOrn7bmuOLbbI/M2/JyxC2AXIFAtBzF8W62no/jSbyxvCXUbZw9k=', 'W3RZKSUMAp9HKnzGkgTSy6eRXUaa2tGzRe0QwLn/EYFi03sg1LEud6qFbPhcLp3obQ51D8WQ42NBMFNRsyIErg==', 'GRucBX1R4HqlFdI5wxwA/32oQD/ZamuzmYAU+Ltba+NpjyvYSRcGNC3LS0f2vQab25ZF/G7Z43q2UTucPLkCcA==', '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 |