Analysis
-
max time kernel
92s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 00:26
Behavioral task
behavioral1
Sample
yjnclient-v3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
yjnclient-v3.exe
Resource
win10v2004-20240508-en
General
-
Target
yjnclient-v3.exe
-
Size
78KB
-
MD5
f758d08d23a5ddf8905d5c17084abf07
-
SHA1
b237a04b0ab5374f41ec90186d1de0250569a82d
-
SHA256
6624c79c2c07fbcb8d4244fadd4e16ad4c536c187c25acaf3b831fff7cbda3c9
-
SHA512
7fd582bb2c319d1cd43efa1d01420f2e58378c15542c044b2450da0da0112a55ae98afd52e851da767d487456927556152d3925ef11194c35bb25bcc9b7f747f
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+BAPIC:5Zv5PDwbjNrmAE+OIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1NDkyMzczMDE3ODY3NDgwMw.GNKnH3._2hi153EQeLcF4SWSwr0pQuzH__TVonJih1mFM
-
server_id
1254923576340119644
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
yjnclient-v3.exedescription pid process Token: SeDebugPrivilege 1900 yjnclient-v3.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1900-0-0x00007FFEEE1A3000-0x00007FFEEE1A5000-memory.dmpFilesize
8KB
-
memory/1900-1-0x000001C586540000-0x000001C586558000-memory.dmpFilesize
96KB
-
memory/1900-2-0x000001C5A0BF0000-0x000001C5A0DB2000-memory.dmpFilesize
1.8MB
-
memory/1900-3-0x00007FFEEE1A0000-0x00007FFEEEC61000-memory.dmpFilesize
10.8MB
-
memory/1900-4-0x000001C5A13F0000-0x000001C5A1918000-memory.dmpFilesize
5.2MB
-
memory/1900-5-0x00007FFEEE1A3000-0x00007FFEEE1A5000-memory.dmpFilesize
8KB
-
memory/1900-6-0x00007FFEEE1A0000-0x00007FFEEEC61000-memory.dmpFilesize
10.8MB