Discord malware analysis: EclipseOfLegends
Comprehensive analysis of malicious behavior in files shared via Discord.
- Identified privilege escalation risks with elevate.exe.
- Analyzed .asar files for potential tampering in Electron-based applications.
- Detected persistence mechanisms in installer-like executables.
Tools used: YARA, ProcMon, capa.
Hybrid Analysis report
Sample hash:
df46dbe66498cd0d9ea8cc62c693172943bc91ff200c06617aa1f5503dae7976
- Network activity: No significant DNS requests or HTTP connections observed.
- File system modifications: No notable files extracted or modified.
- Process activity:
RCC.exe(PID: 3320) associated with the sample. - Extracted strings: Useful for investigation and detection rule creation.
Full report: Hybrid Analysis link