Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 17:32
Behavioral task
behavioral1
Sample
RvcUserInterFace.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
RvcUserInterFace.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
RvcUserInterFace.exe
-
Size
78KB
-
MD5
a93e4c430ad89942f59d9634116ea5c4
-
SHA1
9dd1419ca927a5e95e380f60693223b5fffbe89a
-
SHA256
2ad64e8dfd8a9799ed6a456fa784d1884164eedcea268c910e72fe543891cef2
-
SHA512
4d8420f7558f18be70544e8190b7e75f461c5401e8f1302e08431807232a10f821ebef7c318e8613aff37e7b739fb9a670903ae775a186dddcc82435b3ed0f59
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+pPIC:5Zv5PDwbjNrmAE+ZIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE4NTI0NTc2NjExNDEwMzM1Nw.Gat4VC.1CnS9_cPhmJgKcEV43-EZxZET1Cj3kAzip89cM
-
server_id
1178376627995037726
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2140 2072 RvcUserInterFace.exe 30 PID 2072 wrote to memory of 2140 2072 RvcUserInterFace.exe 30 PID 2072 wrote to memory of 2140 2072 RvcUserInterFace.exe 30