Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2024 16:49

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    3e3f017c1c8bcf10cbfbc51ff1138be4

  • SHA1

    7a8691ff1aae3c546bfc4be8b91a570aa45ba549

  • SHA256

    4594745218af1b12fb3c67b139b2e8a074bb1fc3b6ed9fd1767fd33d6e1ad9e5

  • SHA512

    f5fcd1816ba69b4c4d6ce0e28bdb6414084a7e00464e8ec735d4c4fec8ea00d427690ec375a6915cb345a83250123d9814668bbb79d1f7ceb7a12422c53b4090

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2NzM5MDE3MjgxMTYyNDQ5OQ.G5MJec.y5oe5RQNdBQZLEvWbNgxWf4TlaCt9BIIhflfWs

  • server_id

    1267765387013914655

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1768
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:4448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-0-0x000001E2339D0000-0x000001E2339E8000-memory.dmp

    Filesize

    96KB

  • memory/1768-1-0x00007FFA52493000-0x00007FFA52495000-memory.dmp

    Filesize

    8KB

  • memory/1768-2-0x000001E24DFD0000-0x000001E24E192000-memory.dmp

    Filesize

    1.8MB

  • memory/1768-3-0x00007FFA52490000-0x00007FFA52F51000-memory.dmp

    Filesize

    10.8MB

  • memory/1768-4-0x000001E24E8C0000-0x000001E24EDE8000-memory.dmp

    Filesize

    5.2MB

  • memory/1768-5-0x00007FFA52490000-0x00007FFA52F51000-memory.dmp

    Filesize

    10.8MB