Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 15:09
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
invite-yourself.py
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
invite-yourself.py
Resource
win10v2004-20240508-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
33f218bd11394698c4448e7ffa84c254
-
SHA1
f2a05b616b318007daf0cde3f938a706aeb27cde
-
SHA256
712a42256cf7c2f28f3830dc2f75ee733da382fbe9d5aa16c6d725e893309e5a
-
SHA512
94f339fd837b8529594c76c777a12da45066a99c4f047cd124d8465e3eaef7029e75a625eccf68e91bdb29c1ad2b827faaa005306de07fa28898f2dcfa6b5866
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+APIC:5Zv5PDwbjNrmAE+kIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0Mjg1MDk4NTg3Nzk2Njk4MQ.G0Waz3.y89y4wvxDnICewngCCu5gBaewpajwh45av-jE8
-
server_id
1242851356293992600
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 41 discord.com 42 discord.com 7 discord.com 8 discord.com 28 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2356 Client-built.exe