Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31-05-2024 21:50
Behavioral task
behavioral1
Sample
monoware.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
monoware.exe
Resource
win10v2004-20240426-en
General
-
Target
monoware.exe
-
Size
78KB
-
MD5
8da8b05938831e8e547b60526236ece7
-
SHA1
c27806eed416f8676548d89aa0207d028f800234
-
SHA256
aed0081d6aa8fa3b29d155c6bb45e9278b4562102f8d4497a51db56871a74134
-
SHA512
552e09c36ec48d3117209546e70b1322b929d3f5c59f49af4e66f51c5123230bec766a7315de022027afc0d41920fa7f86f42d82e4f000ac73bab08136221ec6
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+MPIC:5Zv5PDwbjNrmAE+gIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0NjE3NzQ1MDg3OTA5MDY5OA.GQYQs_.CWWy01exlwJSA5-Ryb8HsR5UWeE5uOF58bPcZs
-
server_id
1243377281129254984
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 42 discord.com 55 raw.githubusercontent.com 56 raw.githubusercontent.com 59 discord.com 44 discord.com 45 discord.com 57 discord.com 10 discord.com 11 discord.com 18 discord.com 41 discord.com 43 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 monoware.exe