Analysis
-
max time kernel
361s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 09:59
Behavioral task
behavioral1
Sample
Spoof.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Spoof.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
Spoof.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral4
Sample
Spoof.exe
Resource
win11-20240709-en
General
-
Target
Spoof.exe
-
Size
78KB
-
MD5
76a1b0dc7b01f3dfa44c1b413d1296f2
-
SHA1
e4275d58a76b2af020e481841c820f8ecdfca3d9
-
SHA256
40df802ea915c8e8512b89ab2a679abd989cafc5b790dcf2f477aef02e73b5a8
-
SHA512
1462f6b854315afd5b476f3dcdde99a35a3e628fe4d87a793888dcadc181abc269b926a77d98dbecfb3cc700e351a065cc9ac36522e39611bb7618ba395c18e5
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+7PIC:5Zv5PDwbjNrmAE+zIC
Malware Config
Extracted
discordrat
-
discord_token
MTI2MTA3ODI5MTM4OTg3NDI5OA.G3D8Qc.joy_5q4IR_-dLRqBD8D-WZx-8MohCtmgu7lxyo
-
server_id
1261065603079471246
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2156 2064 Spoof.exe 30 PID 2064 wrote to memory of 2156 2064 Spoof.exe 30 PID 2064 wrote to memory of 2156 2064 Spoof.exe 30