Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2024 13:13
Behavioral task
behavioral1
Sample
wompwomp.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
wompwomp.exe
-
Size
78KB
-
MD5
0a33f2edd00bfba04f343b95e0764e01
-
SHA1
eb0522eaaeee29ca823c79bd519821963775b0e4
-
SHA256
c0ceac223ab8087275fc354c21fb9d7b5b736b32bda0d4ec48bd6d98ccbdd105
-
SHA512
bd96885a348522e1dac97a31cdc063464f3c61a9d001746d29c86ce53506685825723a3c4e4b819330acff4f087c9ce4c2b6431ceb16b0a5170568d0c2e7a797
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2PIC:5Zv5PDwbjNrmAE+yIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI0ODk4MzYzNDkyNTQ1NzQyOA.GxV2D7.CEsRhK2VtMZblqIawpGUjQjej1lOsjyahT4cps
-
server_id
1248983532156489798
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 14 discord.com 26 discord.com 36 discord.com 38 discord.com 59 discord.com 12 discord.com 34 raw.githubusercontent.com 35 raw.githubusercontent.com 58 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4720 wompwomp.exe