Analysis
-
max time kernel
24s -
max time network
60s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
23/02/2024, 14:47
Behavioral task
behavioral1
Sample
Nezur_cracked_by_pysen.exe
Resource
win10-20240214-en
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Nezur_cracked_by_pysen.exe
Resource
win11-20240221-en
4 signatures
1800 seconds
General
-
Target
Nezur_cracked_by_pysen.exe
-
Size
78KB
-
MD5
7ab01d8727291679670263c2f1b128a1
-
SHA1
c98cd2a01bcb28164c066365eeca106f046ae26d
-
SHA256
890728f63ce1c4875b1404954c9e41f2dd43e5b29d37905325e770c0d20c1dcf
-
SHA512
6b4edf87f22855ef3ebd68353633a82747c7a730a3d2b113774055c144013797b2e4a1ab6bb19211b060b7b19771eec369e69326b3fcde19ab691c935958f9be
-
SSDEEP
1536:q2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+rPId:qZv5PDwbjNrmAE+DId
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxMDAxMDUyMDc3MDU4MDUwMA.GkuSm6.X7nnB8gpGeBFbsnyKnNNzyFVTxUNi_qVUz7jzw
-
server_id
1197583538841735228
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 4 discord.com 5 discord.com 8 discord.com 11 discord.com 12 discord.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3368 Nezur_cracked_by_pysen.exe Token: SeDebugPrivilege 2712 whoami.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3368 wrote to memory of 2352 3368 Nezur_cracked_by_pysen.exe 73 PID 3368 wrote to memory of 2352 3368 Nezur_cracked_by_pysen.exe 73 PID 2352 wrote to memory of 2712 2352 cmd.exe 75 PID 2352 wrote to memory of 2712 2352 cmd.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nezur_cracked_by_pysen.exe"C:\Users\Admin\AppData\Local\Temp\Nezur_cracked_by_pysen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C whoami2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-