Analysis
-
max time kernel
463s -
max time network
1158s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-09-2024 01:23
Behavioral task
behavioral1
Sample
HaxMods.exe
Resource
win11-20240802-en
windows11-21h2-x64
3 signatures
1800 seconds
General
-
Target
HaxMods.exe
-
Size
93KB
-
MD5
89b417c2e4b949c8888d53ddf7cef561
-
SHA1
c93f634f3b38888c203c482b1886a741ae4ab649
-
SHA256
f038831b116966e298441b36162b5603837322726fa82d7e7fa8b4c20d8f7ff4
-
SHA512
abde9907b47d54ba225271ceb753277879ced5b9f3893f4b81d3c0bb6de84f23d766eddf6f00c2802407c3e49f948448d6171c40cea64c2dd79a8c3cf6a875ed
-
SSDEEP
1536:F2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+nPIWttZVx:FZv5PDwbjNrmAE+PIc/
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI2OTg1MTgzMTc0NDU5Mzk5Mg.GR0WTi.6wJSWraeR-Rzl_I7fZ7aGCVXpAfAzHPpj4n9qM
-
server_id
976996222277672961
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 4 discord.com 8 discord.com 10 discord.com 11 discord.com 1 discord.com 6 discord.com 9 discord.com 17 discord.com 18 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 672 HaxMods.exe