Analysis
-
max time kernel
149s -
max time network
291s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
15-04-2024 12:56
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
3 signatures
300 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
cfe00066f941125264af692e6ced6685
-
SHA1
b085fde8f6f7ba303be075b22011e3dbe407a822
-
SHA256
a1547e89682f9b271c8b55a05b05ed430e4a96497ad3a4ee1453f54be5b02e85
-
SHA512
771ccb0bd96c8747e8a595accd656660a615262fdf82e77f6757634ba9dace3587a9616951b6000fcf3802831d560b54933bfe2bed371324b441044bf67c1ea9
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+yPIC:5Zv5PDwbjNrmAE++IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIyOTQwMTgyMTIyMzg0NTk2MQ.GZTa-n.5Dqobh7BELS24TSCHvl-31MH30RNudfwZvpKVU
-
server_id
1209983056593817710
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 10 discord.com 13 discord.com 27 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4812 Client-built.exe