Analysis
-
max time kernel
22s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 10:38
Behavioral task
behavioral1
Sample
nezur.exe
Resource
win10v2004-20240221-en
5 signatures
300 seconds
General
-
Target
nezur.exe
-
Size
78KB
-
MD5
e831f10cb1c43f28a9658112b7ec6559
-
SHA1
3de63160c452d10ebb7110efcacc8381437ad740
-
SHA256
d8d70f8222cb043f5827c80bb28ccaf7266a39363da28dcf885cda271b8a62ca
-
SHA512
f779d384a427cb5908ca6ab8a2225c8a728aed2c98214a8341e890a320dde39b3686bed2ee39b218f0e4549c22db4873cdbb394efb6904d9d7a330c6c28ed322
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+lPIC:5Zv5PDwbjNrmAE+1IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxMTIyODQ1ODYzODkwNTM0NA.Gc5rxI.tki81IIJdEi8ki427aBYEnXg_1rjEWPO21iAY0
-
server_id
1210969019700486185
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 26 discord.com 27 discord.com 12 discord.com 13 discord.com 19 discord.com 22 discord.com 23 discord.com 24 raw.githubusercontent.com 25 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3512 nezur.exe Token: SeShutdownPrivilege 3512 nezur.exe