Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 05:05
Behavioral task
behavioral1
Sample
Run.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Run.exe
Resource
win10v2004-20240802-en
General
-
Target
Run.exe
-
Size
78KB
-
MD5
af4b2ac80f5f1cdf5b67fb87918fa8f6
-
SHA1
2d9a85401738144e01000a11d5ad16534dd7703a
-
SHA256
0d12c936747a895675c12ae53af28352bc8a1c6fdec16aa4abf35499e5c86b94
-
SHA512
6f9e4c481ac8678e14ce38b61c5108efade109a03b39330018bd7d3deb9a562abd89bce8ec0a60ec7ee5da592e9158f88d5a7b805997d3515b9e3d2797c2c59e
-
SSDEEP
1536:P2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+VPIu:PZv5PDwbjNrmAE+FIu
Malware Config
Extracted
discordrat
-
discord_token
MTI4OTA4NDQ4NjAxNzA5MzY1Mg.GU9sth.3N0tTy7lqu3KMV6HV1In6GWJPFUNSX5TtpGqBs
-
server_id
1289039707686178857
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 7 discord.com 18 discord.com 26 raw.githubusercontent.com 27 raw.githubusercontent.com 38 discord.com 39 discord.com 8 discord.com 28 discord.com 29 discord.com 37 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2052 Run.exe