Analysis
-
max time kernel
48s -
max time network
52s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/02/2024, 14:47
Behavioral task
behavioral1
Sample
Nezur_cracked_by_pysen.exe
Resource
win10-20240214-en
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Nezur_cracked_by_pysen.exe
Resource
win11-20240221-en
4 signatures
1800 seconds
General
-
Target
Nezur_cracked_by_pysen.exe
-
Size
78KB
-
MD5
7ab01d8727291679670263c2f1b128a1
-
SHA1
c98cd2a01bcb28164c066365eeca106f046ae26d
-
SHA256
890728f63ce1c4875b1404954c9e41f2dd43e5b29d37905325e770c0d20c1dcf
-
SHA512
6b4edf87f22855ef3ebd68353633a82747c7a730a3d2b113774055c144013797b2e4a1ab6bb19211b060b7b19771eec369e69326b3fcde19ab691c935958f9be
-
SSDEEP
1536:q2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+rPId:qZv5PDwbjNrmAE+DId
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxMDAxMDUyMDc3MDU4MDUwMA.GkuSm6.X7nnB8gpGeBFbsnyKnNNzyFVTxUNi_qVUz7jzw
-
server_id
1197583538841735228
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 4 discord.com 6 discord.com 11 raw.githubusercontent.com 7 discord.com 13 discord.com 15 discord.com 12 discord.com 3 discord.com 3 raw.githubusercontent.com 8 discord.com 9 discord.com 10 discord.com 14 discord.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4416 Nezur_cracked_by_pysen.exe Token: SeDebugPrivilege 908 whoami.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2856 4416 Nezur_cracked_by_pysen.exe 78 PID 4416 wrote to memory of 2856 4416 Nezur_cracked_by_pysen.exe 78 PID 2856 wrote to memory of 908 2856 cmd.exe 80 PID 2856 wrote to memory of 908 2856 cmd.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nezur_cracked_by_pysen.exe"C:\Users\Admin\AppData\Local\Temp\Nezur_cracked_by_pysen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C whoami2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:908
-
-