Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 22:10
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240221-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
d6be80db88c9695519804cbf5f753dbc
-
SHA1
bfd78400008e7986560a170ea8c89e7274c67a13
-
SHA256
960bae27c409f61b5063bc1820a3d8d157970ecf0677374e123bb57c530a773c
-
SHA512
c5caf3ef552b17b9edf633343a3af03ea13a6075fea5d7b98ca12270f77f185dac47f36cc58593e6ba385c1136775402e7751fe9ed309528f4e3a00760e3efa2
-
SSDEEP
1536:22WjO8XeEXFZ5P7v88wbjNrfxCXhRoKV6+V+IPIC:2Zv5PDwbjNrmAE+MIC
Malware Config
Extracted
discordrat
-
discord_token
MTIwOTk3NzM4OTc4Njk5MjY4MA.GgKXQw.GlZnSdemjROsg69tPqPfde4J2aOHBLyR18X2Ac
-
server_id
https://discord.com/oauth2/authorize?client_id=1209977389786992680&permissions=8&scope=bot+applications.commands
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 340 wrote to memory of 2740 340 Client-built.exe 28 PID 340 wrote to memory of 2740 340 Client-built.exe 28 PID 340 wrote to memory of 2740 340 Client-built.exe 28