Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 00:38
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240226-en
2 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
b1ecf329b2b3a73dbb22eafbeec7746f
-
SHA1
96013532e70659d79a80007cc23fb731c056a834
-
SHA256
8545cd664d83394960c67ce5079300bed0523de517254ed5f09bc085726397e3
-
SHA512
824cb6097a2d4723ff17d777449fc7bc51b875fc2b07dcbd8c6e2fd5d0ca88775ba3739a04001950d304ce4bad8e676192de1233da3a4c9a5204b56eb392b680
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIyMjM0MzQ2MzE4MjI3NDc0MQ.GKLwJr.ioD4OM5gRyPWNvSmm0kztAP9qOcFcNoLlmNVFg
-
server_id
1222342666822353029
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1636 1432 Client-built.exe 28 PID 1432 wrote to memory of 1636 1432 Client-built.exe 28 PID 1432 wrote to memory of 1636 1432 Client-built.exe 28