Analysis
-
max time kernel
234s -
max time network
292s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2024 02:10
Behavioral task
behavioral1
Sample
Nova Patcher V2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Nova Patcher V2.exe
Resource
win10v2004-20240226-en
General
-
Target
Nova Patcher V2.exe
-
Size
78KB
-
MD5
ef61bc4d93013d6072d6b6b4b2231f58
-
SHA1
a604af75290366150af26cb64bd9bedc01ab7b78
-
SHA256
3ce93b5813e1b8534a70b227f7e8503e10c3480607032c9744354faa2ac4a070
-
SHA512
4cb794bac0eba98e54affbb7c1620113409b3065c515e7565e31848ad2a446010f7216459e7f0f101013e46847a309f56967866ba7b20a85650e51572c3ebc6a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTE5MzM5NjMyNzQzNDk0NDUzMg.GQtyFE.630ymbBowAmccfehQ9LqT14nEeJOjZV4R1iwvU
-
server_id
1193395247854653511
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 31 IoCs
flow ioc 10 discord.com 61 discord.com 69 raw.githubusercontent.com 70 discord.com 80 discord.com 97 discord.com 67 discord.com 95 discord.com 43 raw.githubusercontent.com 44 raw.githubusercontent.com 87 discord.com 94 discord.com 38 discord.com 42 discord.com 68 discord.com 71 discord.com 78 discord.com 86 discord.com 11 discord.com 28 discord.com 79 discord.com 92 discord.com 62 discord.com 81 discord.com 100 discord.com 45 discord.com 46 discord.com 90 discord.com 93 discord.com 98 discord.com 99 discord.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpE49A.tmp.png" Nova Patcher V2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 Nova Patcher V2.exe