Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/10/2024, 14:05
Behavioral task
behavioral1
Sample
Forara.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Forara.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
Forara.exe
-
Size
78KB
-
MD5
2063fbadb4e52d0face3ab0de42f197e
-
SHA1
3feab18f7facdc1304d27fda0c3bb43232dfbbf8
-
SHA256
9aac1e86b02316676a939174260537e3f0025de12f1c6993a26712da67523eec
-
SHA512
9d84c310314494981150b1366ab022df6aa65265e1168ec4a93d6352d684322e7513b1650ff444d153bdcffbb22ad2543077d1a33ee73c3406a6b54d37f5ccb6
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2VPIC:5Zv5PDwbjNrmAE+2FIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxODA0MjI5OTg4NDUwNzE5Nw.GYdZPr.hFJ7gk8gcZbykX2zNBvn1oWJ-z02Fr4B4Lw9Ko
-
server_id
1210950277583208558
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2764 1056 Forara.exe 30 PID 1056 wrote to memory of 2764 1056 Forara.exe 30 PID 1056 wrote to memory of 2764 1056 Forara.exe 30