Analysis
-
max time kernel
134s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
28-06-2024 18:01
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10-20240404-en
2 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
d2ef9355318c5129eeebdac21fd0789b
-
SHA1
e4eeadf28878201869019794f9b8a8e43d5162cc
-
SHA256
122128896b61ca285c88634b4d508de7feb1c32fef36227b5bbd93f141caa173
-
SHA512
ba7c25eda8aa4d6032a53f531e19cb0983a635b1f7cc1216fd9dbf0246ff156ece856fbd2440ff5d3f2fe6b8d2e5081e5795c96db616532ae1c6d91bacc98530
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+MPIC:5Zv5PDwbjNrmAE+gIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NTg1NDczODQ5MTE4MzEzNQ.GdBIvq.wik0qrcaBHCJQ47HJuJh5rd81G3yaKdzXEIGKc
-
server_id
1255855590312382485
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 3608 Client-built.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3608-1-0x000002297B680000-0x000002297B698000-memory.dmpFilesize
96KB
-
memory/3608-0-0x00007FF8BC563000-0x00007FF8BC564000-memory.dmpFilesize
4KB
-
memory/3608-2-0x000002297DC00000-0x000002297DDC2000-memory.dmpFilesize
1.8MB
-
memory/3608-3-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmpFilesize
9.9MB
-
memory/3608-4-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmpFilesize
9.9MB
-
memory/3608-5-0x000002297E400000-0x000002297E926000-memory.dmpFilesize
5.1MB
-
memory/3608-6-0x00007FF8BC563000-0x00007FF8BC564000-memory.dmpFilesize
4KB
-
memory/3608-7-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmpFilesize
9.9MB
-
memory/3608-8-0x00007FF8BC560000-0x00007FF8BCF4C000-memory.dmpFilesize
9.9MB