Analysis
-
max time kernel
323s -
max time network
325s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 17:51
Behavioral task
behavioral1
Sample
Fortnite hook.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Fortnite hook.exe
Resource
win11-20240802-en
windows11-21h2-x64
2 signatures
1800 seconds
General
-
Target
Fortnite hook.exe
-
Size
78KB
-
MD5
81c119c659e7dae7ac35c7724368183d
-
SHA1
d454fb2cd51c7e459289726a2a67c836ecb2e49d
-
SHA256
e0de0454ee94f0521a52883a610a317118926351a423033c9e0c19c685e5c573
-
SHA512
4d57a8c2f05177271580043aa6919f718ddb9ac3ab2067f99709446afce6bd1585f0b4402eb02ade1e13f596838b709202d78cedf7d31220f33e95cfdeb2b36a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V++PIC:5Zv5PDwbjNrmAE+6IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI4OTYzNjI3MDM1NTc3NTUzMA.Ge3CBC.Gx2nDH3psM7IKxiEcuDpDndkDEmhtl7nYvT8jU
-
server_id
1289636027106852907
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3920 Fortnite hook.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite hook.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite hook.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:81⤵PID:1904