Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 15:45
Behavioral task
behavioral1
Sample
Discord Token Grabber.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Discord Token Grabber.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
Discord Token Grabber.exe
-
Size
78KB
-
MD5
38801e10701a6f739024f8e0c7f96d5b
-
SHA1
264f13f2dd1a5c0a6c680d1f5f590c346547b2fe
-
SHA256
132a57ab50e5d15698b9a99929d0f118cad13f7353eb723daa41e1b853354476
-
SHA512
e234044d480e02d99c80a24d50846ec8c870411da2ac725f30309783bc8be589c5bcea70fc43f44db402cf73a63f9a562963107e3367b3090ffda438e567dc8c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+NPIC:5Zv5PDwbjNrmAE+dIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIwMTE2OTIzMjM0MDE4OTIxNA.Gys-q1.tKKJx97VdW_Z7GSgMrKzoWfeRvK3AWWfcSFxhc
-
server_id
1201170015383191592
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2284 2552 Discord Token Grabber.exe 30 PID 2552 wrote to memory of 2284 2552 Discord Token Grabber.exe 30 PID 2552 wrote to memory of 2284 2552 Discord Token Grabber.exe 30