Resubmissions
08-07-2024 14:42
240708-r28qlawfpe 1018-06-2024 22:36
240618-2jdslsselj 1018-06-2024 22:35
240618-2hrm3ssejm 10Analysis
-
max time kernel
193s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 14:42
Behavioral task
behavioral1
Sample
release/Builder.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral2
Sample
release/Release/Discord rat.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
release/dnlib.dll
Resource
win10v2004-20240704-en
General
-
Target
release/Release/Discord rat.exe
-
Size
79KB
-
MD5
d13905e018eb965ded2e28ba0ab257b5
-
SHA1
6d7fe69566fddc69b33d698591c9a2c70d834858
-
SHA256
2bd631c6665656673a923c13359b0dc211debc05b2885127e26b0dce808e2dec
-
SHA512
b95bfdebef33ac72b6c21cdf0abb4961222b7efd17267cd7236e731dd0b6105ece28e784a95455f1ffc8a6dd1d580a467b07b3bd8cb2fb19e2111f1a864c97cb
-
SSDEEP
1536:YCH0jBD2BKkwbPNrfxCXhRoKV6+V+y9viwp:VUjBD2BPwbPNrmAE+MqU
Malware Config
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 powershell.exe 2932 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3784 Discord rat.exe Token: SeDebugPrivilege 4828 Discord rat.exe Token: SeDebugPrivilege 3856 Discord rat.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 212 Discord rat.exe Token: SeDebugPrivilege 3588 dr.exe Token: SeDebugPrivilege 772 dr.exe Token: SeDebugPrivilege 2192 dr.exe Token: SeDebugPrivilege 3824 dr.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2932 wrote to memory of 212 2932 powershell.exe 98 PID 2932 wrote to memory of 212 2932 powershell.exe 98 PID 2932 wrote to memory of 3588 2932 powershell.exe 100 PID 2932 wrote to memory of 3588 2932 powershell.exe 100 PID 2932 wrote to memory of 772 2932 powershell.exe 101 PID 2932 wrote to memory of 772 2932 powershell.exe 101 PID 2932 wrote to memory of 2192 2932 powershell.exe 102 PID 2932 wrote to memory of 2192 2932 powershell.exe 102 PID 2932 wrote to memory of 3824 2932 powershell.exe 103 PID 2932 wrote to memory of 3824 2932 powershell.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3880
-
C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"C:\Users\Admin\AppData\Local\Temp\release\Release\Discord rat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\Desktop\Discord rat.exe"C:\Users\Admin\Desktop\Discord rat.exe" -h2⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\Desktop\dr.exe"C:\Users\Admin\Desktop\dr.exe" -h2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
C:\Users\Admin\Desktop\dr.exe"C:\Users\Admin\Desktop\dr.exe" --help2⤵
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\Desktop\dr.exe"C:\Users\Admin\Desktop\dr.exe" -help2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
C:\Users\Admin\Desktop\dr.exe"C:\Users\Admin\Desktop\dr.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82