Analysis

  • max time kernel
    80s
  • max time network
    81s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 16:11

General

  • Target

    segz‮‮gpj.exe

  • Size

    928KB

  • MD5

    a30f489a124d3944db68ae2b8b86f44e

  • SHA1

    0e1c7b0c81665bc6b7dd46ba35c3a2a4b1c9cffd

  • SHA256

    9c2b448db764a47f1379aeddd6e0d59ef0325e0dd8d046cff5bdbe8c5c603d00

  • SHA512

    9e7a548d48be22587ab111339f349af5823906a130d7767c9d5c22bca6f99a5f964922b8ae1812e9b0418b9bf70717ee2810bc69d5d6818adda6eef7eb14a15c

  • SSDEEP

    24576:puDXTIGaPhEYzUzA0qhWWwZQ0TkRTuM8EAn40Q:MDjlabwz9hkRTMEk40Q

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3MjIyMjI4MjUzNzg5NDAxMA.GNktU2.IT6BXomGu9aAgnt_KiuwO0plIJh1MHckpqtNV0

  • server_id

    1272222756875800707

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\segz‮‮gpj.exe
    "C:\Users\Admin\AppData\Local\Temp\segz‮‮gpj.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    c3615ce7c6222931aaecd07f106ce0fb

    SHA1

    412b197ca471e2683c87a473d71286b6df52a923

    SHA256

    eb55ccc760d23dcdd6f1d8e771deac145d21ecd2ec3f198ff063858b84919316

    SHA512

    46e534ded7594e4c9bc0d7c847ca8e4322bd05e0943a6639c02c711e5785c9279dadc124be91aa2a7ebbe272aefd1cc2bcfb0a2a940c457807426dc95ce91890

  • memory/3540-14-0x00007FFCB3D43000-0x00007FFCB3D45000-memory.dmp

    Filesize

    8KB

  • memory/3540-15-0x00000174F34A0000-0x00000174F34B8000-memory.dmp

    Filesize

    96KB

  • memory/3540-16-0x00000174F5A70000-0x00000174F5C32000-memory.dmp

    Filesize

    1.8MB

  • memory/3540-17-0x00007FFCB3D40000-0x00007FFCB4801000-memory.dmp

    Filesize

    10.8MB

  • memory/3540-18-0x00000174F6270000-0x00000174F6798000-memory.dmp

    Filesize

    5.2MB

  • memory/3540-19-0x00007FFCB3D43000-0x00007FFCB3D45000-memory.dmp

    Filesize

    8KB

  • memory/3540-20-0x00007FFCB3D40000-0x00007FFCB4801000-memory.dmp

    Filesize

    10.8MB