Analysis
-
max time kernel
134s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 11:51
Behavioral task
behavioral1
Sample
Clientbuilt.exe
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Clientbuilt.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Clientbuilt.exe
-
Size
78KB
-
MD5
680f63449192a6d032511cefacf46792
-
SHA1
573cbf939f954ac7f9a03533e6d84821a991eb18
-
SHA256
9d071c0f4585b9e6db048911dccbefef5ed1101920bff5c315e50e3b487b7198
-
SHA512
e0708126e55d5ae31e540f24446e595bd31bf67733cf5c764ecc00b8bfbfb9ba275b6c806bdb6b74087a7e4164781d8f1c2ed7b4552cb823ed4ac1c89d25f6a7
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LPIC:5Zv5PDwbjNrmAE+jIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIwMjkyMTM1NjIyMDQzMjM5NA.GZxvDL.Qh43_c3yNYUKixl3jN4zKk1mkY8z_JGihVoFxY
-
server_id
1202946295204020254
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 discord.com 20 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4876 Clientbuilt.exe