Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 19:19
Behavioral task
behavioral1
Sample
executor.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
executor.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
executor.exe
-
Size
78KB
-
MD5
e1494c0e764cba65e9f4587d66fe0aa7
-
SHA1
9b4d1e845f50f401743848a4482c7612833aa679
-
SHA256
a5eb869393a0ec941ae9bb25f817004cf668ed4cb563189af9b4e976acc91d8a
-
SHA512
129aadf5d7df8835d82fa73b039de621798ab2d34ade3983ea7745555fc56c3ed4a01f03767804f000d73ea1c87a82fa4224794fbb554d5d31d403ffb3f77465
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LPIC:5Zv5PDwbjNrmAE+jIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NjYyNDkzOTk3MzQ4MDYzOA.GT32M_.lhjiOtBbZnAqoOopUAFURemzfI_gNk6usA4kPk
-
server_id
1258096867728818177
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2160 2676 executor.exe 30 PID 2676 wrote to memory of 2160 2676 executor.exe 30 PID 2676 wrote to memory of 2160 2676 executor.exe 30