Analysis
-
max time kernel
139s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 23:34
Behavioral task
behavioral1
Sample
Yizzymenu3.PNMu_O27.5.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Yizzymenu3.PNMu_O27.5.0.exe
Resource
win10v2004-20241007-en
General
-
Target
Yizzymenu3.PNMu_O27.5.0.exe
-
Size
78KB
-
MD5
1c89810efb6940a313a1c4fe4dc0becf
-
SHA1
c24f3be128e54d65bc4a0307c2b6b7fe15a7ef02
-
SHA256
5f037f6aa2a4f018d462a0b636bbce9ee0c5df16e2d4a7535e0b0539c19ef772
-
SHA512
c4f92971ef66215b415a7d3c1de433dbec63c9f9d9e26c8822b3dc2041939e9a95c72f80274d3995d452a4567ca208cc8434fe6ce0c65af5c443860f12138eac
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hPIC:5Zv5PDwbjNrmAE+xIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5NDg3MDQ2MDkzMjI5Njg0Ng.GN6Nk1.90eLf8IhopBLV0mFSsHaYOzQGeDi8ASxB0uhPo
-
server_id
1294871305002160199
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Yizzymenu3.PNMu_O27.5.0.exedescription pid Process Token: SeDebugPrivilege 3976 Yizzymenu3.PNMu_O27.5.0.exe