Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 14:21
Behavioral task
behavioral1
Sample
PyrusC2.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
PyrusC2.exe
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
PyrusC2.exe
-
Size
78KB
-
MD5
27f969d17693c222cdd0494cb2a09f80
-
SHA1
d5425670f1d1d40fb04a2a1c72dc7572a748a67a
-
SHA256
402d83a67acf9591aaf8dc4e62dcafc4dd10f3987cb7a175f0c288de77a86ad7
-
SHA512
33e8e65940074c84f24697ee6cc2654289419f02ca481033bf3c369f26fe4f16c3990a822fe0842f3feb2febe4cb8c57d8e3d1acc63d4c560e54ebe0806a42df
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxMzUwMTgyMzQxMTgyMjYzMg.G_3rn-.hlmdq27ziRAcKVZvZ9b7woSeSyqsovKDo0qouc
-
server_id
1200522482130632846
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1784 1812 PyrusC2.exe 28 PID 1812 wrote to memory of 1784 1812 PyrusC2.exe 28 PID 1812 wrote to memory of 1784 1812 PyrusC2.exe 28