Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-10-2024 14:05
Behavioral task
behavioral1
Sample
Forara.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Forara.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
Forara.exe
-
Size
78KB
-
MD5
2063fbadb4e52d0face3ab0de42f197e
-
SHA1
3feab18f7facdc1304d27fda0c3bb43232dfbbf8
-
SHA256
9aac1e86b02316676a939174260537e3f0025de12f1c6993a26712da67523eec
-
SHA512
9d84c310314494981150b1366ab022df6aa65265e1168ec4a93d6352d684322e7513b1650ff444d153bdcffbb22ad2543077d1a33ee73c3406a6b54d37f5ccb6
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2VPIC:5Zv5PDwbjNrmAE+2FIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIxODA0MjI5OTg4NDUwNzE5Nw.GYdZPr.hFJ7gk8gcZbykX2zNBvn1oWJ-z02Fr4B4Lw9Ko
-
server_id
1210950277583208558
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 Forara.exe