Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 13:35
Behavioral task
behavioral1
Sample
If U get my token u bitch/SetupV04.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
If U get my token u bitch/SetupV04.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
If U get my token u bitch/bitchesGetMytoken.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
If U get my token u bitch/bitchesGetMytoken.exe
Resource
win10v2004-20241007-en
General
-
Target
If U get my token u bitch/SetupV04.exe
-
Size
78KB
-
MD5
7a3a1263d2b8099be9c901315f33d96f
-
SHA1
76dfee6d96b57c9ae42272cad5d0ae9a2521c8cb
-
SHA256
b4b6f36c6d9f56ebc8a32111f078d01a9a14e401db2f07cea58225b086e322bc
-
SHA512
d33094071d5d6d36397decb6c1e36bbaa2997e6af3f17285475d1d1c9097b946692438de7e55a9adc2a022dd61bc0c07f087849cfa35837a1b98898905adda8d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+tPIC:5Zv5PDwbjNrmAE+9IC
Malware Config
Extracted
discordrat
-
discord_token
MTI5Mjg0MzMwMDQ3ODI1NTIxMA.Grp0nq.IltV2goLIM_c10bpfATLRoFvn6NwJdH5SZVh-0
-
server_id
1295367246914261043
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2828 2484 SetupV04.exe 30 PID 2484 wrote to memory of 2828 2484 SetupV04.exe 30 PID 2484 wrote to memory of 2828 2484 SetupV04.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\If U get my token u bitch\SetupV04.exe"C:\Users\Admin\AppData\Local\Temp\If U get my token u bitch\SetupV04.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2484 -s 6002⤵PID:2828
-