Analysis

  • max time kernel
    616s
  • max time network
    1576s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    22/04/2024, 19:45

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    b8acc5f419f4a349433b3c01f8a3c822

  • SHA1

    c7feb9a79cf87fd4acb6a42e142f4ccace2ddd36

  • SHA256

    6e4f16a5a973695809bb0a2e1fe378145ac182b1d2e8bb330f87db5706c89088

  • SHA512

    5e9cc5b0a0d6abc8881cd2dac97426948ee5fc1415174631c37a7998fddcd9899ce5193a4aab2e288be6c33cec41cc9b134e9d87cfb2698876a851abef24fc99

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+bPIC:5Zv5PDwbjNrmAE+TIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzMjAzODc1NDgwNjQwMzA3Mw.GRzhOv.zKSu6rFVvA8_5zM-ZJVRsL3hSvl-u5WON2qze0

  • server_id

    1231633223168032868

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4572
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4572-0-0x00000137A8510000-0x00000137A8528000-memory.dmp

      Filesize

      96KB

    • memory/4572-1-0x00000137C2C80000-0x00000137C2E42000-memory.dmp

      Filesize

      1.8MB

    • memory/4572-3-0x00000137A88E0000-0x00000137A88F0000-memory.dmp

      Filesize

      64KB

    • memory/4572-2-0x00007FFC45320000-0x00007FFC45D0C000-memory.dmp

      Filesize

      9.9MB

    • memory/4572-4-0x00000137C3480000-0x00000137C39A6000-memory.dmp

      Filesize

      5.1MB

    • memory/4572-5-0x00007FFC45320000-0x00007FFC45D0C000-memory.dmp

      Filesize

      9.9MB

    • memory/4572-6-0x00000137A88E0000-0x00000137A88F0000-memory.dmp

      Filesize

      64KB