Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 05:45
Behavioral task
behavioral1
Sample
shibagold v20.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
shibagold v20.exe
Resource
win10v2004-20240611-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
shibagold v20.exe
-
Size
78KB
-
MD5
fdf180973f29781ffd20205549805122
-
SHA1
c9e894fbbd21857a183f1040376e52ef350f9b65
-
SHA256
be61908195a282c5b2219a310e213e1535c1b6a8fea71a74f67e8d382408ac19
-
SHA512
05ea4088a93311323fab3049de04fe234a1f87af9330ed45090ec6e69914c7ca0142d62133b457454e5c967e0778197a3be815e37110a121c953d141fc27907d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+MPIC:5Zv5PDwbjNrmAE+gIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1Nzk1NzI4ODU0MzUyMjk0OA.GtAtvy.J82uIznsLsFpGK5JoP7XQa28oKocMNPC4n6aWI
-
server_id
1257954812113190942
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2504 2136 shibagold v20.exe 28 PID 2136 wrote to memory of 2504 2136 shibagold v20.exe 28 PID 2136 wrote to memory of 2504 2136 shibagold v20.exe 28