Analysis
-
max time kernel
0s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 17:45
Behavioral task
behavioral1
Sample
zorara.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
zorara.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
zorara.exe
-
Size
78KB
-
MD5
cf871781917302521c076c9fb183a92b
-
SHA1
677e7aa6f044e7d04afe34b5276f2836e623d959
-
SHA256
9b2310215dc194404e34a204e0331e30dba68b7bbb3783d3a7c7fc41552d3eed
-
SHA512
2dbcf6f42954f981da3f95079aef5299089f12e1e4c6ba7901b612c778b11dfeafba15f7bca62fb8d18a1e71e9ba7675037600adfc4f6db7234afe7fde60a304
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NDAwNTY0OTIxODIwNzc2Ng.GPszTg.D8KTKB3_qLN0rn3XqvePMm8SzSDKIiDeKse1Ec
-
server_id
1293999282432774195
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2056 2136 zorara.exe 30 PID 2136 wrote to memory of 2056 2136 zorara.exe 30 PID 2136 wrote to memory of 2056 2136 zorara.exe 30