Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2024 14:38
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20240611-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
ecb53bd6e2dcc654cf535d68d3a51ed7
-
SHA1
ec0f92220186d59e15914cd9665eb06f9e5c30b3
-
SHA256
2df3388f1981b32ad6e83789b3051d32894388be5aa997bebfe39ce370f5249c
-
SHA512
28c3b41199bc832349cd794135c81a4af459251a266002ec0db439f243c2d65a81e9697f973e14fc3d213e7f6d8ffef31d254e0a73ce818dc878643e757101c9
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+8PIC:5Zv5PDwbjNrmAE+wIC
Malware Config
Extracted
discordrat
-
discord_token
MTE4MTY1NzgyNTYwNTMzNzExOQ.Gh8-wx.xiyycDlChj7_zNW0UGw9RXtpwC1XGb_ZUVyHPg
-
server_id
1250078737546870865
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
Processes:
flow ioc 56 discord.com 62 discord.com 74 discord.com 76 discord.com 77 discord.com 5 discord.com 28 discord.com 29 discord.com 37 discord.com 67 discord.com 72 raw.githubusercontent.com 22 discord.com 38 discord.com 39 discord.com 53 discord.com 63 discord.com 73 raw.githubusercontent.com 6 discord.com 36 discord.com 65 discord.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
Client-built.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp13D1.tmp.png" Client-built.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 184 Client-built.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Client-built.execmd.exedescription pid process target process PID 184 wrote to memory of 1792 184 Client-built.exe cmd.exe PID 184 wrote to memory of 1792 184 Client-built.exe cmd.exe PID 184 wrote to memory of 4568 184 Client-built.exe cmd.exe PID 184 wrote to memory of 4568 184 Client-built.exe cmd.exe PID 4568 wrote to memory of 4520 4568 cmd.exe cmd.exe PID 4568 wrote to memory of 4520 4568 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C2⤵PID:1792
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C cmd2⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\system32\cmd.execmd3⤵PID:4520
-
-