Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 17:42
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
c2cd7f1f0786166d5ad2830032ed2dd2
-
SHA1
eefad3ed5c81e3a23394618e4fbeb8dc017f16b8
-
SHA256
1848b1b34ce4d5836a96d917c367ab8bb37521564a4a66941cc304df46b873d0
-
SHA512
d7a7a112d73b4de608e096e9d17045e45fb0a7ea5247bed311697d274fa9387a38b6eb52e7e8a205355f61810053109879bc64a8421a89307371a77b527e5bed
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+XPIC:5Zv5PDwbjNrmAE+fIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5NDM1MTIzNDg3ODQwNjc0Ng.GMYFoQ.WK2RjzHJX3SlHFrai-07IoHOpsDvmHiF1VbgT8
-
server_id
1271252640302501918
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
Processes:
flow ioc 22 discord.com 46 discord.com 47 discord.com 59 discord.com 19 discord.com 48 discord.com 56 discord.com 58 discord.com 37 raw.githubusercontent.com 38 discord.com 39 discord.com 45 raw.githubusercontent.com 3 discord.com 4 discord.com 21 discord.com 36 raw.githubusercontent.com 49 discord.com 55 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid Process Token: SeDebugPrivilege 3660 Client-built.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Client-built.exedescription pid Process procid_target PID 3660 wrote to memory of 2984 3660 Client-built.exe 92 PID 3660 wrote to memory of 2984 3660 Client-built.exe 92