Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 09:37
Behavioral task
behavioral1
Sample
TEMPWOOF.exe
Resource
win7-20241010-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
TEMPWOOF.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
TEMPWOOF.exe
-
Size
78KB
-
MD5
a8520354da367622741aa73a7ffe824f
-
SHA1
019c5d1cf1039ec66f162f32aaa4b30d41a6a8ed
-
SHA256
68f153fcdbcb90a64cfbee273fd3ea295a79539172815c08e17ca0a49c18a0a0
-
SHA512
a0d4366545243ad7cfb69dd392dbb102e006a730ff2e73bc7ba16538edc3a45be7367f9486e823a976b61b91dd1ac86c3813f204c42520654531327545133813
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+BPIC:5Zv5PDwbjNrmAE+RIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NDQxMTU0NTQ0MjUyMTE1MA.GMqSEk.OTgvwyANsa2Np5JHNqB_yNh4Mhh-4D2ve9mrnk
-
server_id
1293947432056651797
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 328 wrote to memory of 308 328 TEMPWOOF.exe 31 PID 328 wrote to memory of 308 328 TEMPWOOF.exe 31 PID 328 wrote to memory of 308 328 TEMPWOOF.exe 31