Analysis
-
max time kernel
7s -
max time network
0s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 20:59
Behavioral task
behavioral1
Sample
Password cracker.exe
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Password cracker.exe
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
Password cracker.exe
-
Size
78KB
-
MD5
a2d98167d1ad7f67b00c11d092ae9b2c
-
SHA1
d9a0e16ba8af29dfadc42a77c8f3d56aa2ed0dcc
-
SHA256
afc5e65ac31663013e7efab4921f5a8311353e71b421b0b1ab2f663bfd34ff85
-
SHA512
0d0c131a44b4efb17df2caf5351ff6c2b215b123a890b93fc3d1a2bb301f188483ba17648bc988215975be23bcc818ee4b3d31dffd19015685dcb3c9e49cb6c9
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+IPIC:5Zv5PDwbjNrmAE+MIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI4ODkzMDY2OTc0NTAxMjc0Nw.G3JLXp.6QmxjyawVfrC6pnYIXqBIPzcGjCXEiheg7SMHA
-
server_id
1288929253651386379
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2544 2420 Password cracker.exe 30 PID 2420 wrote to memory of 2544 2420 Password cracker.exe 30 PID 2420 wrote to memory of 2544 2420 Password cracker.exe 30