Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 16:46
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240704-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
54ec7b5f254a6eeff12e3d868506eb67
-
SHA1
608028102ad903d471ee3c4c92a1d7e10f5cd821
-
SHA256
db79dd63cecd45d56db4316a8492a5955022ab9351b09bed759ddae655ce0612
-
SHA512
843382ccc77caa7b9dd2fbca845dd1b9b16d30c35358e05fbbd080aad333a1990cd4d02d13c948607a62da8c60c258ca0f3a6541e35b9717e9597eca287b4404
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ePIC:5Zv5PDwbjNrmAE+aIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1OTI1MTUwMDgzMjY1MzQwMw.Gm7X5G.TUy6pPgT32GEzX7i2ISOKZHUFp777SsSI5Uxcs
-
server_id
1259251939208855572
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 15 discord.com 16 discord.com 26 discord.com 46 discord.com 48 discord.com 22 discord.com 25 discord.com 40 discord.com 41 discord.com 42 raw.githubusercontent.com 43 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2692 Client-built.exe