Malware Analysis Report

2024-09-11 09:17

Sample ID 240623-rs196athja
Target Lethal Company.sfx.exe
SHA256 2103f44233a623b29738ecd251656c3964a873920956fa4cfe7ce17a17001e6e
Tags
discordrat persistence rat rootkit spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

2103f44233a623b29738ecd251656c3964a873920956fa4cfe7ce17a17001e6e

Threat Level: Known bad

The file Lethal Company.sfx.exe was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit spyware stealer

Discord RAT

Downloads MZ/PE file

Executes dropped EXE

Reads user/profile data of web browsers

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Uses Task Scheduler COM API

Scheduled Task/Job: Scheduled Task

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-23 14:28

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-23 14:28

Reported

2024-06-23 14:30

Platform

win10-20240404-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Lethal Company.sfx.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Downloads MZ/PE file

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\SCHTASKS.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe N/A

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Lethal Company.sfx.exe

"C:\Users\Admin\AppData\Local\Temp\Lethal Company.sfx.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Lethal Company.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Lethal Company.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"

C:\Windows\SYSTEM32\SCHTASKS.exe

"SCHTASKS.exe" /create /tn "$77Client-built.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe'" /sc onlogon /rl HIGHEST

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 discord.com udp
US 8.8.8.8:53 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 geolocation-db.com udp
DE 159.89.102.253:443 geolocation-db.com tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 253.102.89.159.in-addr.arpa udp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.110.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 162.159.137.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp
US 162.159.137.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Lethal Company.exe

MD5 a5721809407229d21ea49a2eb5d8e962
SHA1 1456ec35a2d975ec9d5e732c1fb27987c4184697
SHA256 469f208de455fcb6d334b6ec3655102ae6893de374f890961ab9f317bdfb2c8c
SHA512 f2d5dfb53b790f65987cba5340a3983f03eb23416dc8eb1a1d768a109d845191c48a445f54783b16ed4e089086d2f2815f91582a0f2a547d959a74c5a2f4064a

C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

MD5 f42bdf8f20e5255f795c8674660b1726
SHA1 33f091151b0c8fd79a54147745cf31a73fdc5b09
SHA256 29c656fea6ff37a604471ab0ad639c84ee126068e0d35ec08ad4b7d6e10800df
SHA512 348a29e0e4fbd64ac039987d5368e949c033a45ae51165f3f50d1d8189c3b5955d9ccb4fff40427f12771b4584dadc6aa7244e9241a5a76e1584f2442d8b43a2

memory/292-13-0x000002C362B80000-0x000002C362B98000-memory.dmp

memory/292-14-0x00007FFF7A123000-0x00007FFF7A124000-memory.dmp

memory/292-15-0x000002C37D110000-0x000002C37D2D2000-memory.dmp

memory/292-16-0x00007FFF7A120000-0x00007FFF7AB0C000-memory.dmp

memory/292-17-0x000002C37D910000-0x000002C37DE36000-memory.dmp

memory/292-18-0x00007FFF7A123000-0x00007FFF7A124000-memory.dmp

memory/292-19-0x00007FFF7A120000-0x00007FFF7AB0C000-memory.dmp

memory/292-20-0x000002C37F980000-0x000002C37F9F6000-memory.dmp

memory/292-21-0x000002C37CFA0000-0x000002C37CFB2000-memory.dmp

memory/292-22-0x000002C37D8B0000-0x000002C37D8CE000-memory.dmp