Analysis

  • max time kernel
    7s
  • max time network
    8s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2024 11:32

General

  • Target

    Builder.exe

  • Size

    78KB

  • MD5

    15a468c00617cf581ebe066f62d7ad6f

  • SHA1

    860785d409edcc27d83e4c24cc752fd5d828fe28

  • SHA256

    834b1af7c5217536ee4835a55b7da4144f4184090b8ca1a6661c962379e8c798

  • SHA512

    a4e2c71cf45f6111e9c4e1c2a8cb2a8590189783307de1e4d46133ebdf5a97087042ccc133150ac0c9ea075accde396e6f1bab58bcded5fd8ecb08da7d8e250b

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+PPIC:5Zv5PDwbjNrmAE+3IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIwMTcxMTcxNzM5MTAyMDAzMg.GFEkdn._uH4uIuYoULhWwjSm4-qMK5ErSzsRws2cjlsHo

  • server_id

    1201711717391020032

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Builder.exe
    "C:\Users\Admin\AppData\Local\Temp\Builder.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3796

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3796-0-0x00000235E2230000-0x00000235E2248000-memory.dmp

    Filesize

    96KB

  • memory/3796-1-0x00007FFF4F5C3000-0x00007FFF4F5C5000-memory.dmp

    Filesize

    8KB

  • memory/3796-2-0x00000235FC870000-0x00000235FCA32000-memory.dmp

    Filesize

    1.8MB

  • memory/3796-3-0x00007FFF4F5C0000-0x00007FFF50081000-memory.dmp

    Filesize

    10.8MB

  • memory/3796-4-0x00000235FD070000-0x00000235FD598000-memory.dmp

    Filesize

    5.2MB