Analysis

  • max time kernel
    123s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 12:06

Errors

Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-19T12:08:51Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win10v2004-20240412-en/instance_12-dirty.qcow2\"}"

General

  • Target

    Erics Untergang.exe

  • Size

    78KB

  • MD5

    ab433a59759c25b478fc1ec8f7f377a6

  • SHA1

    7b7240713ef5c99efd2441025a62a4ff92e09a33

  • SHA256

    d9cdc51de340cdc2659c255a733ba2e8d5fccacec18d5b9351be5def1a8705ff

  • SHA512

    522c1ab17fff3243da0652fe8fb0f6461366e634d1810a50089ca844405dcd5ba67dbae15ed90d672238c260756e131b3d38444d849b6af3c030d5f49a8f4cd6

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+raPIC:5Zv5PDwbjNrmAE+rGIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyOTc2OTg1NDUyNTkwMzAyMg.GFYmGD.QDZtMe9MhIoDleU68RmFqXoTfYxCF4KLi9BBHM

  • server_id

    1169727745656365087

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Erics Untergang.exe
    "C:\Users\Admin\AppData\Local\Temp\Erics Untergang.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2828-0-0x0000017F3E990000-0x0000017F3E9A8000-memory.dmp

    Filesize

    96KB

  • memory/2828-1-0x0000017F59010000-0x0000017F591D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2828-2-0x00007FFEB5DC0000-0x00007FFEB6881000-memory.dmp

    Filesize

    10.8MB

  • memory/2828-3-0x0000017F3ED90000-0x0000017F3EDA0000-memory.dmp

    Filesize

    64KB

  • memory/2828-4-0x0000017F59810000-0x0000017F59D38000-memory.dmp

    Filesize

    5.2MB

  • memory/2828-5-0x00007FFEB5DC0000-0x00007FFEB6881000-memory.dmp

    Filesize

    10.8MB

  • memory/2828-6-0x0000017F3ED90000-0x0000017F3EDA0000-memory.dmp

    Filesize

    64KB