Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 02:53
Behavioral task
behavioral1
Sample
89c9a0eada8efb9913320a758d35eccf.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
89c9a0eada8efb9913320a758d35eccf.exe
Resource
win10v2004-20240426-en
General
-
Target
89c9a0eada8efb9913320a758d35eccf.exe
-
Size
78KB
-
MD5
89c9a0eada8efb9913320a758d35eccf
-
SHA1
771d63cc7c288dc01df123b91e766a0d3f9c2adb
-
SHA256
d24b8f43e213892a8983486634f05d51b3be74a5086e772d364437e71afced60
-
SHA512
a595cd2ddb29e9fa0e17b2f5d4ad421cae70c7756e56bcc3cf2ae7cb1b5cfc293864ed1b03189eecfa028fe0cca66329576ee97ec7c28a1e9bf9051aa2b78767
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2PIC:5Zv5PDwbjNrmAE+yIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0OTQ2OTUzOTgyNjI3NDM0NQ.Gwe9io.1LizhZrROwujAL5djoKhHKCW7sd2OdMyOeHwS4
-
server_id
1249400378022166539
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3024 2388 89c9a0eada8efb9913320a758d35eccf.exe 28 PID 2388 wrote to memory of 3024 2388 89c9a0eada8efb9913320a758d35eccf.exe 28 PID 2388 wrote to memory of 3024 2388 89c9a0eada8efb9913320a758d35eccf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\89c9a0eada8efb9913320a758d35eccf.exe"C:\Users\Admin\AppData\Local\Temp\89c9a0eada8efb9913320a758d35eccf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2388 -s 6002⤵PID:3024
-