Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-10-2024 13:56
Behavioral task
behavioral1
Sample
Forara.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Forara.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Forara.exe
-
Size
78KB
-
MD5
2063fbadb4e52d0face3ab0de42f197e
-
SHA1
3feab18f7facdc1304d27fda0c3bb43232dfbbf8
-
SHA256
9aac1e86b02316676a939174260537e3f0025de12f1c6993a26712da67523eec
-
SHA512
9d84c310314494981150b1366ab022df6aa65265e1168ec4a93d6352d684322e7513b1650ff444d153bdcffbb22ad2543077d1a33ee73c3406a6b54d37f5ccb6
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2VPIC:5Zv5PDwbjNrmAE+2FIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxODA0MjI5OTg4NDUwNzE5Nw.GYdZPr.hFJ7gk8gcZbykX2zNBvn1oWJ-z02Fr4B4Lw9Ko
-
server_id
1210950277583208558
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2676 2528 Forara.exe 31 PID 2528 wrote to memory of 2676 2528 Forara.exe 31 PID 2528 wrote to memory of 2676 2528 Forara.exe 31