Analysis
-
max time kernel
0s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 14:53
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
11 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
33f218bd11394698c4448e7ffa84c254
-
SHA1
f2a05b616b318007daf0cde3f938a706aeb27cde
-
SHA256
712a42256cf7c2f28f3830dc2f75ee733da382fbe9d5aa16c6d725e893309e5a
-
SHA512
94f339fd837b8529594c76c777a12da45066a99c4f047cd124d8465e3eaef7029e75a625eccf68e91bdb29c1ad2b827faaa005306de07fa28898f2dcfa6b5866
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+APIC:5Zv5PDwbjNrmAE+kIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI0Mjg1MDk4NTg3Nzk2Njk4MQ.G0Waz3.y89y4wvxDnICewngCCu5gBaewpajwh45av-jE8
-
server_id
1242851356293992600
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Client-built.exedescription pid process target process PID 2392 wrote to memory of 2320 2392 Client-built.exe WerFault.exe PID 2392 wrote to memory of 2320 2392 Client-built.exe WerFault.exe PID 2392 wrote to memory of 2320 2392 Client-built.exe WerFault.exe