Analysis

  • max time kernel
    25s
  • max time network
    45s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28-09-2024 19:08

General

  • Target

    How to suck your penis.exe

  • Size

    78KB

  • MD5

    c6cce4b09379172fcadc526309ca53dc

  • SHA1

    f13a8b4900fa5f6af919e44d6e96b2d6255385e5

  • SHA256

    bbb71e23e78c069bbdb12d9242ff44ca29de4914677b31ecdaa2384ae5b0edfb

  • SHA512

    713bb386eedbf2f8583398053d7b5f9bd304f26c26fd66b19c1864bf34dd696a503136b5119aa460265572cd88d4c5fba3f9f7c677e8b417d4c74501d5501126

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+IPIC:5Zv5PDwbjNrmAE+MIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4OTYzNjI3MDM1NTc3NTUzMA.Gqm-Uv.aC0cRHicTfbWOQlioKBGJHpqEMrqELTiN3D_zI

  • server_id

    1289664402252894249

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\How to suck your penis.exe
    "C:\Users\Admin\AppData\Local\Temp\How to suck your penis.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-0-0x00007FFA0AC53000-0x00007FFA0AC55000-memory.dmp

    Filesize

    8KB

  • memory/2248-1-0x00000147022F0000-0x0000014702308000-memory.dmp

    Filesize

    96KB

  • memory/2248-2-0x000001471C9A0000-0x000001471CB62000-memory.dmp

    Filesize

    1.8MB

  • memory/2248-3-0x00007FFA0AC50000-0x00007FFA0B712000-memory.dmp

    Filesize

    10.8MB

  • memory/2248-4-0x000001471DC20000-0x000001471E148000-memory.dmp

    Filesize

    5.2MB

  • memory/2248-5-0x00007FFA0AC53000-0x00007FFA0AC55000-memory.dmp

    Filesize

    8KB

  • memory/2248-6-0x00007FFA0AC50000-0x00007FFA0B712000-memory.dmp

    Filesize

    10.8MB

  • memory/2248-7-0x000001471D6F0000-0x000001471D9BA000-memory.dmp

    Filesize

    2.8MB