Analysis
-
max time kernel
63s -
max time network
64s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 18:04
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win11-20240419-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
a614ffb04f1b40d34e17ebe6958e43cd
-
SHA1
be32312b8b3d426cf3be1267aacc19dc7b332826
-
SHA256
1476253151800a7f9e7c39b61a25a2c107769212ed847083f8ac0d5ed49d8631
-
SHA512
59646dbd941e419943b82ce79c3c7444fbfe52d046f8adfaf25c8448a88b1b8c487252234db25cd3bb092e8721eb93f8bb8b8c9a8e8545e3fbc0081569d42f33
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+CPIC:5Zv5PDwbjNrmAE+uIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1MzM5NTg3ODUxMzg2ODg1Mg.GrWkny.T42N-XPbZi5vXQ9yat9Y4l_0_1T1AkqFScCsFs
-
server_id
1250120108064378900
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 9 discord.com 20 discord.com 29 discord.com 30 discord.com 8 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 1612 Client-built.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1612-0-0x00000243420E0000-0x00000243420F8000-memory.dmpFilesize
96KB
-
memory/1612-1-0x00007FF9BD413000-0x00007FF9BD415000-memory.dmpFilesize
8KB
-
memory/1612-2-0x000002435C690000-0x000002435C852000-memory.dmpFilesize
1.8MB
-
memory/1612-3-0x00007FF9BD410000-0x00007FF9BDED1000-memory.dmpFilesize
10.8MB
-
memory/1612-4-0x000002435CE90000-0x000002435D3B8000-memory.dmpFilesize
5.2MB
-
memory/1612-5-0x00007FF9BD413000-0x00007FF9BD415000-memory.dmpFilesize
8KB
-
memory/1612-6-0x00007FF9BD410000-0x00007FF9BDED1000-memory.dmpFilesize
10.8MB