Analysis
-
max time kernel
10s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 12:51
Behavioral task
behavioral1
Sample
zorara.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
300 seconds
General
-
Target
zorara.exe
-
Size
78KB
-
MD5
cf871781917302521c076c9fb183a92b
-
SHA1
677e7aa6f044e7d04afe34b5276f2836e623d959
-
SHA256
9b2310215dc194404e34a204e0331e30dba68b7bbb3783d3a7c7fc41552d3eed
-
SHA512
2dbcf6f42954f981da3f95079aef5299089f12e1e4c6ba7901b612c778b11dfeafba15f7bca62fb8d18a1e71e9ba7675037600adfc4f6db7234afe7fde60a304
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIC:5Zv5PDwbjNrmAE+EIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NDAwNTY0OTIxODIwNzc2Ng.GPszTg.D8KTKB3_qLN0rn3XqvePMm8SzSDKIiDeKse1Ec
-
server_id
1293999282432774195
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4944 zorara.exe