Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    15-08-2024 12:04

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    8156ccc10bc5c1f7ba69b450863f80b6

  • SHA1

    93d4dc689026e4ae3f90436b4761d3cf5e5e9ac8

  • SHA256

    3df56b170bc3939db11caf42589764b2fc4665378bf3167680a32ae09fc4928b

  • SHA512

    9ea925180774e406a6ef514e61950b1361fb917b47810f6b13c0330cb8167a62060b74dfc64206daeec8ac00dff3cdbdd55cebdc6ba14bb8e11d715e67665004

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+yPIC:5Zv5PDwbjNrmAE++IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3MzYxMjMzOTIzMjM3NDgxNQ.GQcb7R.nEBZJ0-xqAtaQmaz1po2HsTsPCGl9hphGbXGvo

  • server_id

    1273612222693642371

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1744 -s 596
      2⤵
        PID:2184

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1744-0-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

      Filesize

      4KB

    • memory/1744-1-0x000000013F900000-0x000000013F918000-memory.dmp

      Filesize

      96KB

    • memory/1744-2-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

      Filesize

      9.9MB

    • memory/1744-3-0x000007FEF64B3000-0x000007FEF64B4000-memory.dmp

      Filesize

      4KB

    • memory/1744-4-0x000007FEF64B0000-0x000007FEF6E9C000-memory.dmp

      Filesize

      9.9MB