Analysis
-
max time kernel
94s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 20:47
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
a2fb449bd3ed381e6ca38085b375c98b
-
SHA1
7d310e246ed0c5f28f2845bb872d04780d8368bd
-
SHA256
eb2d9753a0947d41505604498af6dd89fee2b0215fa20e375144e012d457ea0b
-
SHA512
8ad703dc3dac923e18c0aa95be4d6a903e5ed9789a478d35344d4025c319d0f71f8b2f9804ed0ea43859a5594df5e95fb1fafdfff43679ad2b94ef4cb967011b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+vPIC:5Zv5PDwbjNrmAE+XIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTEyOTg5MjIxNzU5OTgyMzk4Mw.GnWnte.vyhNeWc4uW-fNQNN6fLlu3GI805VkSgmANbczg
-
server_id
1267744364285661215
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 discord.com 9 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1256 Client-built.exe