Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 21:55
Behavioral task
behavioral1
Sample
zorara (1).exe
Resource
win7-20241010-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
zorara (1).exe
Resource
win10v2004-20241007-en
3 signatures
150 seconds
General
-
Target
zorara (1).exe
-
Size
16.4MB
-
MD5
598830bb1d3598b76df422fc7572cfe0
-
SHA1
ad88d53508e4589262968b023c6bd067b230ef77
-
SHA256
41183a1d0ecdf0c1b4c9be01c0a67ac4b90e3cdca7a6defa4f9480e7f71f8999
-
SHA512
299cca048e7a2a98940ee1db0c4c641009bc132b13e8c9efe4ffa6a42df8720b0d368a43ba05193e949ab73d2350243e67aac6a56849045bf370c265ec72fa11
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NDAwNTY0OTIxODIwNzc2Ng.GPszTg.D8KTKB3_qLN0rn3XqvePMm8SzSDKIiDeKse1Ec
-
server_id
1293999282432774195
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2700 2876 zorara (1).exe 30 PID 2876 wrote to memory of 2700 2876 zorara (1).exe 30 PID 2876 wrote to memory of 2700 2876 zorara (1).exe 30