Analysis
-
max time kernel
88s -
max time network
89s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 21:21
Behavioral task
behavioral1
Sample
NexusMClauncher.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
NexusMClauncher.exe
Resource
win10v2004-20240226-en
General
-
Target
NexusMClauncher.exe
-
Size
78KB
-
MD5
28bc9d7b03c0193c8e39356a3918c283
-
SHA1
aa8a0449e50ab88b7581d030dae27656d3ce750a
-
SHA256
e45f355a20da8f62a76ecfe9c4a8bf771a758da2a94e5f21b3f40fdf4e495577
-
SHA512
17249d646e8b890fd2472b5b71637286fbf3d9d8e989b3b0bd8c4d8aa3358bc55dd8bcb7949a85f6f6a218bca0e079c967115715f1457e867c3ebec20b78a8d4
-
SSDEEP
1536:h2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V++PId:hZv5PDwbjNrmAE+6Id
Malware Config
Extracted
discordrat
-
discord_token
MTA1NTYxMjI2MTEwMTc0ODI3NA.Gga7En.nff0UktfNY9-rOMpPI8K8TtWuYMsw82Ms30hDY
-
server_id
1206669799229489283
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 178 discord.com 186 raw.githubusercontent.com 241 discord.com 244 discord.com 22 discord.com 176 discord.com 188 raw.githubusercontent.com 225 discord.com 226 discord.com 21 discord.com 30 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 NexusMClauncher.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NexusMClauncher.exe"C:\Users\Admin\AppData\Local\Temp\NexusMClauncher.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4904