Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 14:22
Behavioral task
behavioral1
Sample
SolaraBETA.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
3 signatures
600 seconds
General
-
Target
SolaraBETA.exe
-
Size
164KB
-
MD5
c621290f1c3cccfb1b674730f2321cc4
-
SHA1
1eb131f80c798b28a4da069f6d8e81c9fe196eef
-
SHA256
b0148bf218b82646e3a8fd54d422d139782b7523ed3b059e8512eeb76f08d28a
-
SHA512
b15a8e332f29c34d6d2854e460103ecf506aec07a3ae8934a84c6b28cb895ab342dd9f938671651da62ccf59fe2e3294bfd57b788d63c61ab713cb548ba7dcce
-
SSDEEP
3072:2Zv5PDwbjNrmAE++IjLdGgCvZuT75lTT3MJObhH:Wv5PDwbBraIjLdvm27wJON
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE5NTg0ODc1MjI0NjgyNTA1Mg.GRtYGx.P98MiE-lbwut9fTP5NtSX6ZRthe8Rn4mi3R-iM
-
server_id
1234555349349040179
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 11 discord.com 14 discord.com 30 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4392 SolaraBETA.exe