Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 18:45
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
e0c733b9b96700f34191ce9b4de022c7
-
SHA1
ccb67dc371b3ec3cac4da6c0c94579e204ae28d7
-
SHA256
7a115e8e2a08dc79a6c5c44f70c73fadf94a2929dd979d3fe075c5d5c165c3be
-
SHA512
0b63b5f321d8a3d8441578cf5c64376d1912c4eafce946a3a3f9fe4a4c0a2319a65fc424baa618955fcd43b9f88d11dbe3cfb591451bb3a92cb6755e08cf6c85
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+QPIC:5Zv5PDwbjNrmAE+UIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI2NjEwODMxNjM3NTk3Mzk3OQ.GL09hQ.Q7YqgeNtKFoxMQV9SscWFfX41Ca4P--315XiRI
-
server_id
1266108221232255026
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2324 Client-built.exe