Malware Analysis Report

2024-09-11 09:35

Sample ID 240528-tzpaaach64
Target Client-built.exe
SHA256 d82bc37ca66a2c6b78dcf7934a818d3d7692890fffe98104f30e71d9f0875e73
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d82bc37ca66a2c6b78dcf7934a818d3d7692890fffe98104f30e71d9f0875e73

Threat Level: Known bad

The file Client-built.exe was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discordrat family

Discord RAT

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-28 16:29

Signatures

Discordrat family

discordrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-28 16:29

Reported

2024-05-28 17:07

Platform

win10v2004-20240426-en

Max time kernel

455s

Max time network

1174s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.135.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 234.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 138.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 105.193.132.51.in-addr.arpa udp

Files

memory/2096-0-0x00007FFEDCC93000-0x00007FFEDCC95000-memory.dmp

memory/2096-1-0x00000285BA520000-0x00000285BA538000-memory.dmp

memory/2096-2-0x00000285D4AE0000-0x00000285D4CA2000-memory.dmp

memory/2096-3-0x00007FFEDCC90000-0x00007FFEDD751000-memory.dmp

memory/2096-4-0x00000285D5420000-0x00000285D5948000-memory.dmp

memory/2096-5-0x00007FFEDCC93000-0x00007FFEDCC95000-memory.dmp

memory/2096-6-0x00007FFEDCC90000-0x00007FFEDD751000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-28 16:29

Reported

2024-05-28 17:07

Platform

win10-20240404-en

Max time kernel

615s

Max time network

868s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Client-built.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 208.143.182.52.in-addr.arpa udp
US 8.8.8.8:53 138.107.17.2.in-addr.arpa udp
US 138.91.171.81:80 tcp
US 8.8.8.8:53 159.113.53.23.in-addr.arpa udp

Files

memory/2912-0-0x00007FFBD5FE3000-0x00007FFBD5FE4000-memory.dmp

memory/2912-1-0x000002C0C0FF0000-0x000002C0C1008000-memory.dmp

memory/2912-2-0x000002C0DB610000-0x000002C0DB7D2000-memory.dmp

memory/2912-3-0x00007FFBD5FE0000-0x00007FFBD69CC000-memory.dmp

memory/2912-4-0x000002C0DBE10000-0x000002C0DC336000-memory.dmp

memory/2912-5-0x00007FFBD5FE3000-0x00007FFBD5FE4000-memory.dmp

memory/2912-6-0x00007FFBD5FE0000-0x00007FFBD69CC000-memory.dmp