Analysis

  • max time kernel
    35s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 17:31

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    e0c733b9b96700f34191ce9b4de022c7

  • SHA1

    ccb67dc371b3ec3cac4da6c0c94579e204ae28d7

  • SHA256

    7a115e8e2a08dc79a6c5c44f70c73fadf94a2929dd979d3fe075c5d5c165c3be

  • SHA512

    0b63b5f321d8a3d8441578cf5c64376d1912c4eafce946a3a3f9fe4a4c0a2319a65fc424baa618955fcd43b9f88d11dbe3cfb591451bb3a92cb6755e08cf6c85

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+QPIC:5Zv5PDwbjNrmAE+UIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2NjEwODMxNjM3NTk3Mzk3OQ.GL09hQ.Q7YqgeNtKFoxMQV9SscWFfX41Ca4P--315XiRI

  • server_id

    1266108221232255026

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1276
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1972

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1276-0-0x000001E647AC0000-0x000001E647AD8000-memory.dmp

      Filesize

      96KB

    • memory/1276-1-0x00007FFF3B173000-0x00007FFF3B175000-memory.dmp

      Filesize

      8KB

    • memory/1276-2-0x000001E662050000-0x000001E662212000-memory.dmp

      Filesize

      1.8MB

    • memory/1276-3-0x00007FFF3B170000-0x00007FFF3BC31000-memory.dmp

      Filesize

      10.8MB

    • memory/1276-4-0x000001E662850000-0x000001E662D78000-memory.dmp

      Filesize

      5.2MB

    • memory/1276-5-0x00007FFF3B173000-0x00007FFF3B175000-memory.dmp

      Filesize

      8KB

    • memory/1276-6-0x00007FFF3B170000-0x00007FFF3BC31000-memory.dmp

      Filesize

      10.8MB