Analysis
-
max time kernel
3s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 00:29
Behavioral task
behavioral1
Sample
Pulse/Puls3.exe
Resource
win7-20240215-en
windows7-x64
2 signatures
30 seconds
Behavioral task
behavioral2
Sample
Pulse/Puls3.exe
Resource
win10v2004-20240221-en
windows10-2004-x64
3 signatures
30 seconds
General
-
Target
Pulse/Puls3.exe
-
Size
78KB
-
MD5
51d9e7c5add36e54a3d502dac1afe1a1
-
SHA1
6e688edfed4312cd80eeebc732cee5fbf27c6938
-
SHA256
11c74b6ac577cde4263d36a157297570f8cb0fd7a49952dba66f120dace50589
-
SHA512
90cee8b03e128fadcf6e46f012d457baf0eb8e3ee0d7f915b9d2c34e79e818a3f82b00169c88820003e7e40392bf050708d768686944ff7726192e3d9e76c03a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE5MjYyNjk3OTI5NjUzMDU4Mg.Gkmw1A.uzdxvrJmBbLe9WAmB3tj-e7z3IRRqJBLc79PR0
-
server_id
1168288064578256976
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 3 discord.com 4 discord.com 8 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 Puls3.exe