Analysis

  • max time kernel
    94s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 07:10

General

  • Target

    a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe

  • Size

    724KB

  • MD5

    ac3ef2f121a0395e07e294763f4897f4

  • SHA1

    8e7d7022aba6b6a5909d9d9ac04ed1951f7f1ca6

  • SHA256

    a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254

  • SHA512

    14f68dd0e78b4e55d86787b3bbc3d334c61d0156602fffd79f441285a63b2fffbe7ea24c02d74f1cd62e1017d821c3bae0ac064e8b6653dc1c501d9067a117c1

  • SSDEEP

    12288:kyveQB/fTHIGaPkKEYzURNAwbAg8bxF04VsyDXmCfp6Ah+lcy/HQRMm8:kuDXTIGaPhEYzUzA0qUry7mCfp9h+lbH

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5NDUyNDAwNzYwOTAwODEyOQ.GCjW8M.SxCGlpfPNu5sW0K9sgiNhPHPY1UaaaQWEqijfk

  • server_id

    1294532251186364457

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe
    "C:\Users\Admin\AppData\Local\Temp\a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    3b6b4a5f94da14a520284e92c7ddd083

    SHA1

    5bc9b62a35892a8abcf65020b2d415c346fd1cdd

    SHA256

    ad40786f8d0934dae35cdcc8e60208143b969abdd3c085e03b47a60a37681ed5

    SHA512

    455e2a54ee291bda6235c538f2e497614e121d2f4a46d9aee8eafd1fc9bed44d82b70ea673a77ad0113d1405761566b1fa2c503611962c6359fc46c924c1ce7c

  • memory/1220-16-0x00007FFCE9773000-0x00007FFCE9775000-memory.dmp

    Filesize

    8KB

  • memory/1220-17-0x00000241D0170000-0x00000241D0188000-memory.dmp

    Filesize

    96KB

  • memory/1220-18-0x00000241EA720000-0x00000241EA8E2000-memory.dmp

    Filesize

    1.8MB

  • memory/1220-19-0x00007FFCE9770000-0x00007FFCEA231000-memory.dmp

    Filesize

    10.8MB

  • memory/1220-20-0x00000241EAF20000-0x00000241EB448000-memory.dmp

    Filesize

    5.2MB

  • memory/1220-21-0x00007FFCE9773000-0x00007FFCE9775000-memory.dmp

    Filesize

    8KB

  • memory/1220-22-0x00007FFCE9770000-0x00007FFCEA231000-memory.dmp

    Filesize

    10.8MB