Overview
overview
10Static
static
3Fluxteam_net_API.dll
windows7-x64
1Fluxteam_net_API.dll
windows10-2004-x64
1Hovac_API.dll
windows7-x64
1Hovac_API.dll
windows10-2004-x64
1Module.dll
windows7-x64
1Module.dll
windows10-2004-x64
3Rc7 Remake V4.0.3.exe
windows7-x64
10Rc7 Remake V4.0.3.exe
windows10-2004-x64
VisualStud...ol.dll
windows7-x64
1VisualStud...ol.dll
windows10-2004-x64
1discord-rpc-w32.dll
windows7-x64
3discord-rpc-w32.dll
windows10-2004-x64
3qdRFzx.exe
windows7-x64
3qdRFzx.exe
windows10-2004-x64
1scripts/(I...ce).js
windows7-x64
1scripts/(I...ce).js
windows10-2004-x64
1scripts/Aimbot 3.0.js
windows7-x64
1scripts/Aimbot 3.0.js
windows10-2004-x64
1scripts/Aimbot.js
windows7-x64
1scripts/Aimbot.js
windows10-2004-x64
1scripts/CC Aimbot.js
windows7-x64
1scripts/CC Aimbot.js
windows10-2004-x64
1scripts/De... v2.js
windows7-x64
1scripts/De... v2.js
windows10-2004-x64
1scripts/De...rer.js
windows7-x64
1scripts/De...rer.js
windows10-2004-x64
1scripts/FE...R6 .js
windows7-x64
1scripts/FE...R6 .js
windows10-2004-x64
1scripts/FE R6.js
windows7-x64
1scripts/FE R6.js
windows10-2004-x64
1scripts/FE...ats.js
windows7-x64
1scripts/FE...ats.js
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-10-2023 23:25
Static task
static1
Behavioral task
behavioral1
Sample
Fluxteam_net_API.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Fluxteam_net_API.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Hovac_API.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Hovac_API.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Module.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Module.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Rc7 Remake V4.0.3.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Rc7 Remake V4.0.3.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
VisualStudioTabControl.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
VisualStudioTabControl.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
discord-rpc-w32.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
discord-rpc-w32.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
qdRFzx.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
qdRFzx.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral15
Sample
scripts/(InfiniteYieldMasterSource).js
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
scripts/(InfiniteYieldMasterSource).js
Resource
win10v2004-20230915-en
Behavioral task
behavioral17
Sample
scripts/Aimbot 3.0.js
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
scripts/Aimbot 3.0.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
scripts/Aimbot.js
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
scripts/Aimbot.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral21
Sample
scripts/CC Aimbot.js
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
scripts/CC Aimbot.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral23
Sample
scripts/Dex Explorer v2.js
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
scripts/Dex Explorer v2.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
scripts/Dex Explorer.js
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
scripts/Dex Explorer.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral27
Sample
scripts/FE Insane Animations R6 .js
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
scripts/FE Insane Animations R6 .js
Resource
win10v2004-20230915-en
Behavioral task
behavioral29
Sample
scripts/FE R6.js
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
scripts/FE R6.js
Resource
win10v2004-20230915-en
Behavioral task
behavioral31
Sample
scripts/FE snake hats.js
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
scripts/FE snake hats.js
Resource
win10v2004-20230915-en
General
-
Target
Rc7 Remake V4.0.3.exe
-
Size
1.8MB
-
MD5
e9fe08dc305ecef9d3e30387b7606449
-
SHA1
36bf2ff5ea70c0b39b2d130769aea4b335881217
-
SHA256
de659081e783bdc5529dcf792033da79266d4749368d1de30089bf8d39635ec9
-
SHA512
17f7d01ea90db97b4632339c17d8f0188bd7879ce2825c67b1f33036d882ac5da1294a77cf00613fbd92da3a78f116b01bcfbe59c162487720d4258140eb4cac
-
SSDEEP
24576:13rpuCfwthkMlFwF6OMJStMWxvS4HyQaHRt1qgKhrE7mgJW:RpuGw39lFGMJSIOyNHr6um/
Malware Config
Extracted
discordrat
-
discord_token
MTEzODUwOTU4NDY5NzQwOTYwNw.GnqcvS.rCX2N6w-7YZE2LAuqXgNbKNTXYvV_RvO9gYEzQ
-
server_id
1138506428089368657
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 3 IoCs
pid Process 2596 dll.exe 2796 ExploitBuilder.exe 2708 26d0d.exe -
Loads dropped DLL 8 IoCs
pid Process 2972 Rc7 Remake V4.0.3.exe 2972 Rc7 Remake V4.0.3.exe 2972 Rc7 Remake V4.0.3.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe 568 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 568 2708 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2596 2972 Rc7 Remake V4.0.3.exe 29 PID 2972 wrote to memory of 2596 2972 Rc7 Remake V4.0.3.exe 29 PID 2972 wrote to memory of 2596 2972 Rc7 Remake V4.0.3.exe 29 PID 2972 wrote to memory of 2596 2972 Rc7 Remake V4.0.3.exe 29 PID 2972 wrote to memory of 2796 2972 Rc7 Remake V4.0.3.exe 30 PID 2972 wrote to memory of 2796 2972 Rc7 Remake V4.0.3.exe 30 PID 2972 wrote to memory of 2796 2972 Rc7 Remake V4.0.3.exe 30 PID 2972 wrote to memory of 2796 2972 Rc7 Remake V4.0.3.exe 30 PID 2796 wrote to memory of 2708 2796 ExploitBuilder.exe 31 PID 2796 wrote to memory of 2708 2796 ExploitBuilder.exe 31 PID 2796 wrote to memory of 2708 2796 ExploitBuilder.exe 31 PID 2796 wrote to memory of 2708 2796 ExploitBuilder.exe 31 PID 2708 wrote to memory of 568 2708 26d0d.exe 32 PID 2708 wrote to memory of 568 2708 26d0d.exe 32 PID 2708 wrote to memory of 568 2708 26d0d.exe 32 PID 2708 wrote to memory of 568 2708 26d0d.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rc7 Remake V4.0.3.exe"C:\Users\Admin\AppData\Local\Temp\Rc7 Remake V4.0.3.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\dll.exe"C:\Users\Admin\AppData\Local\Temp\dll.exe"2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\ExploitBuilder.exe"C:\Users\Admin\AppData\Local\Temp\ExploitBuilder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\26d0d.exeC:\Users\Admin\AppData\Local\Temp\26d0d.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 6884⤵
- Loads dropped DLL
- Program crash
PID:568
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
823KB
MD59b15b83b221ab41cf691613bb635b635
SHA169616dfa1a8e27b45bfbaca809a248fd1bb734e6
SHA256470bd5725ecd1d7ef1165b22eb627a833e1442ed0caca6109d34b93691e6e72f
SHA5122688597e292393fa3c1ca4ed930da78fce650d61be7161e511acb053f487202c1b5036f8159a54b7c897916e79ed1b60c2cab58d7d14f198b6dd150752d1efd2
-
Filesize
823KB
MD59b15b83b221ab41cf691613bb635b635
SHA169616dfa1a8e27b45bfbaca809a248fd1bb734e6
SHA256470bd5725ecd1d7ef1165b22eb627a833e1442ed0caca6109d34b93691e6e72f
SHA5122688597e292393fa3c1ca4ed930da78fce650d61be7161e511acb053f487202c1b5036f8159a54b7c897916e79ed1b60c2cab58d7d14f198b6dd150752d1efd2
-
Filesize
823KB
MD59b15b83b221ab41cf691613bb635b635
SHA169616dfa1a8e27b45bfbaca809a248fd1bb734e6
SHA256470bd5725ecd1d7ef1165b22eb627a833e1442ed0caca6109d34b93691e6e72f
SHA5122688597e292393fa3c1ca4ed930da78fce650d61be7161e511acb053f487202c1b5036f8159a54b7c897916e79ed1b60c2cab58d7d14f198b6dd150752d1efd2
-
Filesize
1.0MB
MD54ae52cae7044da6688e77e675b4b5556
SHA1e02d28a8716cb958e5a58eae91cbc2c740f16438
SHA2564e674fe01f97520ac70113ce0888b7342fe24af8026307a4add5abd6914570df
SHA51229bc5e27fe76b2e2f68ad7035f29c8f2ff1c8d15d7e0614c229a51ececeed3f79e54bfda08ee1e24d3dad6bb9611a7e43f492223b5f2665f4f7eba1a6be563d8
-
Filesize
1.0MB
MD54ae52cae7044da6688e77e675b4b5556
SHA1e02d28a8716cb958e5a58eae91cbc2c740f16438
SHA2564e674fe01f97520ac70113ce0888b7342fe24af8026307a4add5abd6914570df
SHA51229bc5e27fe76b2e2f68ad7035f29c8f2ff1c8d15d7e0614c229a51ececeed3f79e54bfda08ee1e24d3dad6bb9611a7e43f492223b5f2665f4f7eba1a6be563d8
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
555KB
MD524d889e520c895a413a25a31f32fe9b4
SHA18b9268749e71c845824830fa84bf5cdb79c727d1
SHA256abe1547dd985e1172ba52d35be4d6505291ccc9fa1fb007eda6f2d8504380219
SHA512f860b8cb3cf8da3372806a0cb5f02d6d848759e33ff93c68359f9016ce6899d9e1f4a0c4b74a99abe6145f7489ba2a8f3b38fa91cc3d2d53bc18e540d0d7efdb
-
Filesize
823KB
MD59b15b83b221ab41cf691613bb635b635
SHA169616dfa1a8e27b45bfbaca809a248fd1bb734e6
SHA256470bd5725ecd1d7ef1165b22eb627a833e1442ed0caca6109d34b93691e6e72f
SHA5122688597e292393fa3c1ca4ed930da78fce650d61be7161e511acb053f487202c1b5036f8159a54b7c897916e79ed1b60c2cab58d7d14f198b6dd150752d1efd2
-
Filesize
823KB
MD59b15b83b221ab41cf691613bb635b635
SHA169616dfa1a8e27b45bfbaca809a248fd1bb734e6
SHA256470bd5725ecd1d7ef1165b22eb627a833e1442ed0caca6109d34b93691e6e72f
SHA5122688597e292393fa3c1ca4ed930da78fce650d61be7161e511acb053f487202c1b5036f8159a54b7c897916e79ed1b60c2cab58d7d14f198b6dd150752d1efd2
-
Filesize
1.0MB
MD54ae52cae7044da6688e77e675b4b5556
SHA1e02d28a8716cb958e5a58eae91cbc2c740f16438
SHA2564e674fe01f97520ac70113ce0888b7342fe24af8026307a4add5abd6914570df
SHA51229bc5e27fe76b2e2f68ad7035f29c8f2ff1c8d15d7e0614c229a51ececeed3f79e54bfda08ee1e24d3dad6bb9611a7e43f492223b5f2665f4f7eba1a6be563d8