Analysis
-
max time kernel
177s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 19:13
Behavioral task
behavioral1
Sample
discordratclient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
discordratclient.exe
Resource
win10v2004-20240802-en
General
-
Target
discordratclient.exe
-
Size
78KB
-
MD5
968fd8c1b9fbbe9345e4c14357ab015f
-
SHA1
22d4f725fea9cc804a094132edbbb472326ffaa3
-
SHA256
08bd10bde0879c2bc0f72a4f1be106237b3e15dae52897454fa69bd036cecb05
-
SHA512
fb7f220e25c9dd22922ddd578a961c8144d08097f6575b075d8f6b66146da55959e34e332dec4ff64e987cddf909ff5c6c9a54c9b802a8690224edce930d3d25
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+/PIC:5Zv5PDwbjNrmAE+HIC
Malware Config
Extracted
discordrat
-
discord_token
MTI4NTU4ODM5MDc1ODE5MTIzNQ.GwW9id.kiyuRUJzPrMsV4YY0PXjxpwWhqeWLNrB1F_Voo
-
server_id
1285585473472958475
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
flow ioc 53 discord.com 69 discord.com 9 discord.com 43 discord.com 44 discord.com 51 raw.githubusercontent.com 20 discord.com 34 discord.com 70 discord.com 56 discord.com 57 discord.com 33 discord.com 50 raw.githubusercontent.com 52 discord.com 55 raw.githubusercontent.com 10 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3108 discordratclient.exe