Analysis

  • max time kernel
    1559s
  • max time network
    1560s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    25-05-2024 03:29

General

  • Target

    Discord-RAT-2.0

  • Size

    274KB

  • MD5

    e3e8b5d8153f0c05ef7285a112eed0a8

  • SHA1

    bb377461729a48d14eb360ca1268b0b6f44d03be

  • SHA256

    d26a87117270afd6d5d009e107d35206a00c8c133e0ffed5c0bbbc0dc0842643

  • SHA512

    740f0ec2196e4c7babfc86bb44af6cf1a2b6413944a51f222943850b363ba37a19cbcc5e532b9bdfd03c5f5c812905136cd88ddc5fb15cf9e3141c95665d5f39

  • SSDEEP

    6144:S1oGZ2n9ddKM2vkm0aWyRv349UvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vi0Zo3K:woGZ2n9ddKM2vkm0aWyRv349UvZJT3CV

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    7d47bf853dd9e627f378df12e2ea9277

    SHA1

    51d9d8e8e1156dce97e3ff5470cd038218fd91d1

    SHA256

    c3298be416786baed600a968b59228bde15c66318c4037ba109d2c6e5e814663

    SHA512

    dd8e9fb1966fdb1062c7ed465105d392536b1d38080724748eaf3a0cf8de311ed24bf60d7a746e92f4796dc17774e21643378d839aa453478d294efc5760d722