Analysis
-
max time kernel
47s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 11:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
MALAKA EXECUTOR BETA NEW!!!!.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
300 seconds
Errors
Reason
Machine shutdown
General
-
Target
MALAKA EXECUTOR BETA NEW!!!!.exe
-
Size
51KB
-
MD5
03a5a611d5513161c87af15155ccf1eb
-
SHA1
65065a2fd9fef64600a2a99e724fd5c3ef04e834
-
SHA256
f685c343d248433140387d90b94f5b6c3491ea9d4e0889ff3ed75183dc447864
-
SHA512
62e1f506b40216aa1511756a57b0718924f3f2dfd7649076c0e5e77e512e49f3579c91a9ba6ba491fd2f2237f70518eec8e5a6995e7c35401450f94112765194
-
SSDEEP
1536:HIE5xBjVQhFtnPdn6Nqf3pB33l7TWL39S:HjBR4tnPd6E3t7N
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIyOTAxOTkwNTIxMTIzNjQ0Mw.GL1ul6.YGvHzcpHwSs8FsPPxgS_cUXaoY3Rjyzgg9fSxA
-
server_id
1229019250258083923
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 29 discord.com 8 discord.com 9 discord.com 20 discord.com 24 discord.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4072 MALAKA EXECUTOR BETA NEW!!!!.exe Token: SeShutdownPrivilege 4072 MALAKA EXECUTOR BETA NEW!!!!.exe