Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 16:33
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240802-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
46a8e7a2c393668ff77aecbae90c8911
-
SHA1
f0ea3a3fd16adf942293a4e757df0e48ebe21295
-
SHA256
fa60201746c95b3f677ca925974bc13ba960605aaca1ef760fcaef6dd1a33763
-
SHA512
d5bdce45c388ecc5158f40bdc86aaac3baeb41f741524986bf0509440844cee41d1984992c9abbe571b4dd67fd7ff50651a7f68898b7f3c0722f68bde1b7b0c3
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+lPIC:5Zv5PDwbjNrmAE+1IC
Malware Config
Extracted
discordrat
-
discord_token
MTI4MzQ3NTA4NjEzNzEwMjQ0OQ.GXK4Uh.Vn0i9UWuWKtfRJu3XOm02szb8iWpQN12ITk4P8
-
server_id
1283475329184305224
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 61 discord.com 11 discord.com 12 discord.com 24 discord.com 58 raw.githubusercontent.com 59 raw.githubusercontent.com 60 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4856 Client-built.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4856 Client-built.exe