Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-05-2024 18:35

General

  • Target

    sloboz.exe

  • Size

    78KB

  • MD5

    c7d1943e8ec62020b641ebe5cb2d7a52

  • SHA1

    e593fef7b6fba77b5122356c185a11ef141ddea2

  • SHA256

    dffd1069ff1bd7960bf9efdcb3ef2bbaae5b62451111d9cbba6e83496a87d8ee

  • SHA512

    a2232738f86c03a12df3b9cc3a893149263739a587bf487c1e2b3d112404e0aa24a3069e70e61cb6cbeea44988c459b77e02c1ffeea1f895e11fc0a108a32996

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+4PIC:5Zv5PDwbjNrmAE+cIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0MDM3MDk5OTY2MTQyODc5Ng.GMijqA.uyojYG2AsRktzjktbRO8gXc262B6gEZ72EPvmw

  • server_id

    1234761788848078879

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\sloboz.exe
    "C:\Users\Admin\AppData\Local\Temp\sloboz.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SYSTEM32\SCHTASKS.exe
      "SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I
      2⤵
        PID:3240

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/740-0-0x0000024DC6750000-0x0000024DC6768000-memory.dmp

      Filesize

      96KB

    • memory/740-1-0x00007FFE7DFB3000-0x00007FFE7DFB5000-memory.dmp

      Filesize

      8KB

    • memory/740-2-0x0000024DE0D60000-0x0000024DE0F22000-memory.dmp

      Filesize

      1.8MB

    • memory/740-3-0x00007FFE7DFB0000-0x00007FFE7EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/740-4-0x0000024DE15A0000-0x0000024DE1AC8000-memory.dmp

      Filesize

      5.2MB

    • memory/740-5-0x00007FFE7DFB3000-0x00007FFE7DFB5000-memory.dmp

      Filesize

      8KB

    • memory/740-6-0x00007FFE7DFB0000-0x00007FFE7EA71000-memory.dmp

      Filesize

      10.8MB

    • memory/740-7-0x0000024DC84B0000-0x0000024DC84BE000-memory.dmp

      Filesize

      56KB