Analysis

  • max time kernel
    177s
  • max time network
    278s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2024 19:13

General

  • Target

    discordratclient.exe

  • Size

    78KB

  • MD5

    968fd8c1b9fbbe9345e4c14357ab015f

  • SHA1

    22d4f725fea9cc804a094132edbbb472326ffaa3

  • SHA256

    08bd10bde0879c2bc0f72a4f1be106237b3e15dae52897454fa69bd036cecb05

  • SHA512

    fb7f220e25c9dd22922ddd578a961c8144d08097f6575b075d8f6b66146da55959e34e332dec4ff64e987cddf909ff5c6c9a54c9b802a8690224edce930d3d25

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+/PIC:5Zv5PDwbjNrmAE+HIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4NTU4ODM5MDc1ODE5MTIzNQ.GwW9id.kiyuRUJzPrMsV4YY0PXjxpwWhqeWLNrB1F_Voo

  • server_id

    1285585473472958475

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\discordratclient.exe
    "C:\Users\Admin\AppData\Local\Temp\discordratclient.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3108-0-0x00007FFAAD1A3000-0x00007FFAAD1A5000-memory.dmp

    Filesize

    8KB

  • memory/3108-1-0x0000029D12420000-0x0000029D12438000-memory.dmp

    Filesize

    96KB

  • memory/3108-2-0x0000029D2CAB0000-0x0000029D2CC72000-memory.dmp

    Filesize

    1.8MB

  • memory/3108-3-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/3108-4-0x0000029D2D2B0000-0x0000029D2D7D8000-memory.dmp

    Filesize

    5.2MB

  • memory/3108-5-0x00007FFAAD1A3000-0x00007FFAAD1A5000-memory.dmp

    Filesize

    8KB

  • memory/3108-6-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB

  • memory/3108-7-0x0000029D2CF10000-0x0000029D2CF86000-memory.dmp

    Filesize

    472KB

  • memory/3108-8-0x0000029D14090000-0x0000029D140A2000-memory.dmp

    Filesize

    72KB

  • memory/3108-9-0x0000029D140E0000-0x0000029D140FE000-memory.dmp

    Filesize

    120KB

  • memory/3108-10-0x0000029D140A0000-0x0000029D140AE000-memory.dmp

    Filesize

    56KB

  • memory/3108-12-0x00007FFAAD1A0000-0x00007FFAADC61000-memory.dmp

    Filesize

    10.8MB