Analysis

  • max time kernel
    302s
  • max time network
    304s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2024 16:21

General

  • Target

    Spoofer.exe

  • Size

    78KB

  • MD5

    fc08a46e1d5ccd8f2f4405764579e96d

  • SHA1

    500dc596fc1c7d812805883fa99564ed501c260c

  • SHA256

    e0c19df68387d0abf5057a4b160061c447c396f426c2095da6e7bb05882580e0

  • SHA512

    b783217687adc0d5ee1b180e94bbe8ed3f6fd17f9726779201ac7b68a2a4cdd1293595c6c68fdf3b3bfa757c93db61d158a7b820e43429c052a3d7a03e5ca592

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+DPIC:5Zv5PDwbjNrmAE+bIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2OTMyNjMyMjU2NDQ2NDcyMA.Gu6MeW.9sR1DdBFtf43caLzgKfKK2XA_VZxEuQCEc5QyA

  • server_id

    1269151973408641135

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\Spoofer.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1844
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1136

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1844-0-0x00007FFEC3803000-0x00007FFEC3805000-memory.dmp

      Filesize

      8KB

    • memory/1844-1-0x0000022FAA3F0000-0x0000022FAA408000-memory.dmp

      Filesize

      96KB

    • memory/1844-2-0x0000022FC4AE0000-0x0000022FC4CA2000-memory.dmp

      Filesize

      1.8MB

    • memory/1844-3-0x00007FFEC3800000-0x00007FFEC42C1000-memory.dmp

      Filesize

      10.8MB

    • memory/1844-4-0x0000022FC51E0000-0x0000022FC5708000-memory.dmp

      Filesize

      5.2MB

    • memory/1844-5-0x00007FFEC3800000-0x00007FFEC42C1000-memory.dmp

      Filesize

      10.8MB