Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 21:27
Behavioral task
behavioral1
Sample
dovokna.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
dovokna.exe
-
Size
78KB
-
MD5
61aafea599d09a68d5340d5608f84233
-
SHA1
6af9c778cd42a6b7c2ce074df3fd58ba28879102
-
SHA256
003f4826529864be9025beb1980e3c45c083f7c13db8db93e619c6da1e241bf3
-
SHA512
79bacbead0995525b0252c7ccdadb0d7a7a7585710273dfe21cd73ed0a24cb689ee4c0936350e8c0634b0f2bf30345af8496b6fc77dbf2b9d01f2b513be78c30
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+0PIC:5Zv5PDwbjNrmAE+oIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NjYyNDkzOTk3MzQ4MDYzOA.GGFK0n.GHWgf03QhLbLDi22Mnxm1GywDpUNxfPetussT4
-
server_id
1258096867728818177
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 9 discord.com 10 discord.com 19 discord.com 50 discord.com 55 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
dovokna.exedescription pid process Token: SeDebugPrivilege 4556 dovokna.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dovokna.exe"C:\Users\Admin\AppData\Local\Temp\dovokna.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4924