Analysis
-
max time kernel
1559s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 20:24
Behavioral task
behavioral1
Sample
babaya new.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
babaya new.exe
Resource
win10v2004-20241007-en
General
-
Target
babaya new.exe
-
Size
78KB
-
MD5
7209d6899561c71ca335c2d795d67ae3
-
SHA1
eb5685dbd5db4d2800649dc3fcc57b9a6917d09a
-
SHA256
7f63a4691f7d818ef1868d269d38862c0a19dcda170cdb5dd8788d8d451a548c
-
SHA512
cab4cb58746ff45766fd1566e6a3879d5ff85c759ee620fca9d305dfdd85a8c526d1b296683541821b87bd00e6b678a046d5c9c4b7d7badcb8386b4db8029e92
-
SSDEEP
1536:K2WjO8XeEXF15P7v88wbjNrfxCXhRoKV6+V+VPIC:KZb5PDwbjNrmAE+FIC
Malware Config
Extracted
discordrat
-
discord_token
https://discord.com/api/webhooks/1296206480852127744/QR0Ij0ivxObUlFMF780C3YZ5TxjdP8PCuVx-iht_GGwTaj8HwwmhOy18jEHc0UiQWQO2
-
server_id
1296206452741902457
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
babaya new.exedescription pid Process procid_target PID 2888 wrote to memory of 2824 2888 babaya new.exe 30 PID 2888 wrote to memory of 2824 2888 babaya new.exe 30 PID 2888 wrote to memory of 2824 2888 babaya new.exe 30