Resubmissions

24/02/2024, 06:58

240224-hrqmladd8w 10

19/02/2024, 18:06

240219-wpq28sag74 10

Analysis

  • max time kernel
    148s
  • max time network
    158s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 06:58

General

  • Target

    Screenshare.exe

  • Size

    78KB

  • MD5

    70b3eeef461d8d7ecab87148bdc5da0b

  • SHA1

    3f009f215e2fb8912b9a4e18e57f987187dae35d

  • SHA256

    43d86b0fc95ce07b8f58b9563331ae8cc2cd2dd262630849f50d7627dddd2033

  • SHA512

    67d3dcf3b96dca3d13a1e632939a68572079ec24fef8e97935d6ac88124d4f24c338e520a8e3182ee95f7823281c4d172e536170647c0ecb6b4520ad1fa563a4

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+M6PIC:5Zv5PDwbjNrmAE+MmIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTA0MDgyMTIzNDg2ODQzNzAyNw.GtcA8A.6TpBs-kYgoKXVc6Z9vKobut--ke0IH5N9tFS0g

  • server_id

    1207140966327263283

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Screenshare.exe
    "C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4984

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4984-0-0x0000022F16CB0000-0x0000022F16CC8000-memory.dmp

    Filesize

    96KB

  • memory/4984-1-0x0000022F31440000-0x0000022F31602000-memory.dmp

    Filesize

    1.8MB

  • memory/4984-2-0x00007FFC433C0000-0x00007FFC43E82000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-3-0x0000022F313E0000-0x0000022F313F0000-memory.dmp

    Filesize

    64KB

  • memory/4984-4-0x0000022F326C0000-0x0000022F32BE8000-memory.dmp

    Filesize

    5.2MB

  • memory/4984-5-0x00007FFC433C0000-0x00007FFC43E82000-memory.dmp

    Filesize

    10.8MB

  • memory/4984-6-0x0000022F313E0000-0x0000022F313F0000-memory.dmp

    Filesize

    64KB