| Architecture |
IMAGE_FILE_MACHINE_AMD64
|
|---|---|
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| Compilation Date | 2084-Mar-20 18:56:28 |
| Comments | |
| CompanyName | |
| FileDescription | Discord rat |
| FileVersion | 1.0.0.0 |
| InternalName | Discord rat.exe |
| LegalCopyright | Copyright © 2022 |
| LegalTrademarks | |
| OriginalFilename | Discord rat.exe |
| ProductName | Discord rat |
| ProductVersion | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Suspicious | Strings found in the binary may indicate undesirable behavior: |
Contains references to system / monitoring tools:
|
| Suspicious | The PE is possibly packed. | The PE only has 0 import(s). |
| Malicious | VirusTotal score: 51/72 (Scanned on 2026-01-29 16:24:32) |
ALYac:
Gen:Variant.Application.msilheracles.1255
APEX: Malicious AVG: Win64:MalwareX-gen [Expl] AhnLab-V3: Trojan/Win.Generic.C5217098 Antiy-AVL: Trojan/Win32.Agent Arcabit: Trojan.Application.msilheracles.D4E7 Avast: Win64:MalwareX-gen [Expl] Avira: HEUR/AGEN.1378898 BitDefender: Gen:Variant.Application.msilheracles.1255 Bkav: W64.AIDetectMalware.CS CTX: exe.unknown.msilheracles ClamAV: Win.Malware.Tedy-9965181-0 CrowdStrike: win/malicious_confidence_100% (D) Cynet: Malicious (score: 100) DeepInstinct: MALICIOUS DrWeb: BackDoor.SpyBotNET.70 ESET-NOD32: MSIL/Agent.DZT trojan Elastic: malicious (high confidence) Emsisoft: Gen:Variant.Application.msilheracles.1255 (B) F-Secure: Heuristic.HEUR/AGEN.1378898 Fortinet: MSIL/Agent.DZT!tr GData: MSIL.Backdoor.DiscordRAT.B Google: Detected Ikarus: Trojan-Downloader.MSIL.Agent K7AntiVirus: Trojan ( 005b0c8d1 ) K7GW: Trojan ( 005b0c8d1 ) Kaspersky: Trojan.Win32.Injuke.pflk Malwarebytes: Generic.Malware.Gen.DDS MaxSecure: Trojan.Malware.349262377.susgen McAfeeD: ti!BE1C1E4C686E MicroWorld-eScan: Gen:Variant.Application.msilheracles.1255 Microsoft: Trojan:MSIL/Dcstl.psyX!MTB Rising: Backdoor.DiscordRAT!1.F9B9 (CLASSIC) SUPERAntiSpyware: Trojan.Agent/Gen-Jalapeno Sangfor: Suspicious.Win32.Save.a SentinelOne: Static AI - Malicious PE Skyhigh: DiscordRAT!A3C65E60D41F Sophos: Mal/Stealer-J Symantec: ML.Attribute.HighConfidence Tencent: Trojan.MSIL.Agent.kp TrellixENS: DiscordRAT!A3C65E60D41F TrendMicro: Backdoor.MSIL.DISCOGRAT.SMPI TrendMicro-HouseCall: Backdoor.MSIL.DISCOGRAT.SMPI VBA32: Backdoor.SpyBotNET VIPRE: Gen:Variant.Application.msilheracles.1255 Varist: W64/Agent.EWH.gen!Eldorado VirIT: Trojan.Win64.Agent.BBO Webroot: W32.Trojan.Gen Zillya: Trojan.Agent.Win32.4102040 ZoneAlarm: Mal/Stealer-J huorong: TrojanSpy/MSIL.Stealer.add!crit |
| e_magic | MZ |
|---|---|
| e_cblp | 0x90 |
| e_cp | 0x3 |
| e_crlc | 0 |
| e_cparhdr | 0x4 |
| e_minalloc | 0 |
| e_maxalloc | 0xffff |
| e_ss | 0 |
| e_sp | 0xb8 |
| e_csum | 0 |
| e_ip | 0 |
| e_cs | 0 |
| e_ovno | 0 |
| e_oemid | 0 |
| e_oeminfo | 0 |
| e_lfanew | 0x80 |
| Signature | PE |
|---|---|
| Machine |
IMAGE_FILE_MACHINE_AMD64
|
| NumberofSections | 2 |
| TimeDateStamp | 2084-Mar-20 18:56:28 |
| PointerToSymbolTable | 0 |
| NumberOfSymbols | 0 |
| SizeOfOptionalHeader | 0xf0 |
| Characteristics |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
|
| Magic | PE32+ |
|---|---|
| LinkerVersion | 48.0 |
| SizeOfCode | 0x13200 |
| SizeOfInitializedData | 0x600 |
| SizeOfUninitializedData | 0 |
| AddressOfEntryPoint | 0x0000000000000000 (Section: ?) |
| BaseOfCode | 0x2000 |
| ImageBase | 0x140000000 |
| SectionAlignment | 0x2000 |
| FileAlignment | 0x200 |
| OperatingSystemVersion | 4.0 |
| ImageVersion | 0.0 |
| SubsystemVersion | 6.0 |
| Win32VersionValue | 0 |
| SizeOfImage | 0x18000 |
| SizeOfHeaders | 0x200 |
| Checksum | 0 |
| Subsystem |
IMAGE_SUBSYSTEM_WINDOWS_GUI
|
| DllCharacteristics |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
|
| SizeofStackReserve | 0x400000 |
| SizeofStackCommit | 0x4000 |
| SizeofHeapReserve | 0x100000 |
| SizeofHeapCommit | 0x2000 |
| LoaderFlags | 0 |
| NumberOfRvaAndSizes | 16 |
| Signature | 0xfeef04bd |
|---|---|
| StructVersion | 0x10000 |
| FileVersion | 1.0.0.0 |
| ProductVersion | 1.0.0.0 |
| FileFlags | (EMPTY) |
| FileOs |
VOS_DOS_WINDOWS32
VOS_NT_WINDOWS32
VOS__WINDOWS32
|
| FileType |
VFT_APP
|
| Language | UNKNOWN |
| Comments | |
| CompanyName | |
| FileDescription | Discord rat |
| FileVersion (#2) | 1.0.0.0 |
| InternalName | Discord rat.exe |
| LegalCopyright | Copyright © 2022 |
| LegalTrademarks | |
| OriginalFilename | Discord rat.exe |
| ProductName | Discord rat |
| ProductVersion (#2) | 1.0.0.0 |
| Assembly Version | 1.0.0.0 |
| Resource LangID | UNKNOWN |
|---|