Analysis

  • max time kernel
    185s
  • max time network
    258s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-07-2024 20:17

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    65749c07329677eb12f6a8de41976e00

  • SHA1

    dd29b61599b8bcc50835d61d70e08804bd1f286d

  • SHA256

    10b42ca763ebd516b250edfb6880559dce7decb1f57761faedac37f6a8c19698

  • SHA512

    9ed57d5c12dea7c2bced82dc0998221b32bad69d8a72ba9133957ab621d42d29ddee65a2bce41cfc24781e0564d495d0481f9bd4f01ff8080e03690f63c880dc

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI1OTk1MjE0NTAxMzQxMTkwMg.G2HuaR.9q5-okrCTKQwPsL-j06Nffwzm9X2nOpJRIjYbc

  • server_id

    1259952014545387540

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4416-0-0x00007FFFC6E73000-0x00007FFFC6E75000-memory.dmp

    Filesize

    8KB

  • memory/4416-1-0x0000015E35F20000-0x0000015E35F38000-memory.dmp

    Filesize

    96KB

  • memory/4416-2-0x0000015E50680000-0x0000015E50842000-memory.dmp

    Filesize

    1.8MB

  • memory/4416-3-0x00007FFFC6E70000-0x00007FFFC7932000-memory.dmp

    Filesize

    10.8MB

  • memory/4416-4-0x0000015E51900000-0x0000015E51E28000-memory.dmp

    Filesize

    5.2MB

  • memory/4416-5-0x0000015E50600000-0x0000015E50676000-memory.dmp

    Filesize

    472KB

  • memory/4416-6-0x0000015E363F0000-0x0000015E36402000-memory.dmp

    Filesize

    72KB

  • memory/4416-7-0x0000015E37C50000-0x0000015E37C6E000-memory.dmp

    Filesize

    120KB

  • memory/4416-8-0x00007FFFC6E73000-0x00007FFFC6E75000-memory.dmp

    Filesize

    8KB

  • memory/4416-9-0x00007FFFC6E70000-0x00007FFFC7932000-memory.dmp

    Filesize

    10.8MB

  • memory/4416-10-0x0000015E51440000-0x0000015E5170A000-memory.dmp

    Filesize

    2.8MB

  • memory/4416-12-0x00007FFFC6E70000-0x00007FFFC7932000-memory.dmp

    Filesize

    10.8MB