Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 20:55
Behavioral task
behavioral1
Sample
babayanew.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
babayanew.exe
Resource
win10v2004-20241007-en
General
-
Target
babayanew.exe
-
Size
78KB
-
MD5
7209d6899561c71ca335c2d795d67ae3
-
SHA1
eb5685dbd5db4d2800649dc3fcc57b9a6917d09a
-
SHA256
7f63a4691f7d818ef1868d269d38862c0a19dcda170cdb5dd8788d8d451a548c
-
SHA512
cab4cb58746ff45766fd1566e6a3879d5ff85c759ee620fca9d305dfdd85a8c526d1b296683541821b87bd00e6b678a046d5c9c4b7d7badcb8386b4db8029e92
-
SSDEEP
1536:K2WjO8XeEXF15P7v88wbjNrfxCXhRoKV6+V+VPIC:KZb5PDwbjNrmAE+FIC
Malware Config
Extracted
discordrat
-
discord_token
https://discord.com/api/webhooks/1296206480852127744/QR0Ij0ivxObUlFMF780C3YZ5TxjdP8PCuVx-iht_GGwTaj8HwwmhOy18jEHc0UiQWQO2
-
server_id
1296206452741902457
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
babayanew.exedescription pid Process Token: SeDebugPrivilege 2900 babayanew.exe