Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-06-2024 20:49
Behavioral task
behavioral1
Sample
rblx hacks REAL/Client-built.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rblx hacks REAL/Client-built.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
rblx hacks REAL/dnlib.dll
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
rblx hacks REAL/dnlib.dll
Resource
win10v2004-20240508-en
General
-
Target
rblx hacks REAL/Client-built.exe
-
Size
78KB
-
MD5
456bf5de813e40ca39898ca6ba16b1d7
-
SHA1
4b668377e4f81802f5a975739a2799d140e04d55
-
SHA256
9ea8612ee8a4e2599a73e99cee7afd8be19faedd655ff2f54b1f06e486021135
-
SHA512
7f3747235a0f48c774ad084207f43201dfdac9bc3bfd340f645cd7c13b61a853e01227756d1f9f154f5f541914c316b86fcbe1ab9a130aee117f17daab9b3191
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+nPIC:5Zv5PDwbjNrmAE+PIC
Malware Config
Extracted
discordrat
-
discord_token
MTI0OTU3NzU3NDA5MTE5NDQxOQ.GsOG5Z.ZZXzRiXjjatxWtgj6vEvWrUD7fTQVKec_XOUKg
-
server_id
1177034497322127390
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2312 wrote to memory of 1072 2312 Client-built.exe 28 PID 2312 wrote to memory of 1072 2312 Client-built.exe 28 PID 2312 wrote to memory of 1072 2312 Client-built.exe 28