Analysis
-
max time kernel
38s -
max time network
49s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-06-2024 23:09
Behavioral task
behavioral1
Sample
Client-built - Copy.exe
Resource
win11-20240508-en
windows11-21h2-x64
2 signatures
600 seconds
General
-
Target
Client-built - Copy.exe
-
Size
78KB
-
MD5
11337f54bb7f945eb52a0b83b53fb9ad
-
SHA1
4428ae9931fac427bdfaff28d25341b5bbaff9b2
-
SHA256
9dfa7e1e224b1cc278cf8c27860e41b4aa74fe3b7803c88ef1fb141407664cd6
-
SHA512
5a8a9fea5781f9d71622c8f7ff0ef2f490c4550bc7b89bc03fdcc7574acd015a46b23e743b3ddbc9882d49883734ec32d7b935fb163bf1aad760f4c6b1020112
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+oPIC:5Zv5PDwbjNrmAE+sIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NDI2NzMxMTc1NDMxNzkzNQ.GoPcja.FF7ZvdPuXSDJlSfQE-IZwjF3_I5m58m9KQJ8fI
-
server_id
1254269611520823366
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built - Copy.exedescription pid process Token: SeDebugPrivilege 4304 Client-built - Copy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built - Copy.exe"C:\Users\Admin\AppData\Local\Temp\Client-built - Copy.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5100