Analysis
-
max time kernel
185s -
max time network
258s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-07-2024 20:17
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240709-en
windows11-21h2-x64
5 signatures
300 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
65749c07329677eb12f6a8de41976e00
-
SHA1
dd29b61599b8bcc50835d61d70e08804bd1f286d
-
SHA256
10b42ca763ebd516b250edfb6880559dce7decb1f57761faedac37f6a8c19698
-
SHA512
9ed57d5c12dea7c2bced82dc0998221b32bad69d8a72ba9133957ab621d42d29ddee65a2bce41cfc24781e0564d495d0481f9bd4f01ff8080e03690f63c880dc
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1OTk1MjE0NTAxMzQxMTkwMg.G2HuaR.9q5-okrCTKQwPsL-j06Nffwzm9X2nOpJRIjYbc
-
server_id
1259952014545387540
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 20 IoCs
Processes:
flow ioc 6 raw.githubusercontent.com 7 discord.com 12 discord.com 23 discord.com 3 discord.com 5 discord.com 9 discord.com 13 raw.githubusercontent.com 14 discord.com 20 discord.com 1 raw.githubusercontent.com 8 discord.com 1 discord.com 22 discord.com 15 discord.com 17 discord.com 18 discord.com 19 discord.com 10 discord.com 11 discord.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Client-built.exepid process 4416 Client-built.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 4416 Client-built.exe