Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-10-2024 20:33
Behavioral task
behavioral1
Sample
SynapseMBeta.exe
Resource
win7-20241010-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
SynapseMBeta.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
SynapseMBeta.exe
-
Size
78KB
-
MD5
1d3c777126c5fba217784ae40065e7c4
-
SHA1
bcd0e895689b8462bcc03c02c158aaa78a9bc6d3
-
SHA256
bc668cea4faae0367cee9388267e905c6eb9d963c567313fa9da0b0d3d49ee72
-
SHA512
ffa01c74ca3393befa1b9e339e01732275637afa135ebc6654976b2055039922f3f1d1f415ed99902fbfffe5f04730146ac544e8ad9bb99c29551c65cb2e8396
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ZPIC:5Zv5PDwbjNrmAE+pIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NjU1MzkxOTAxODY5Njc4NA.G6Nv51.MeUAqaMSRiGQfBdB9XTQ7dPID-ZwW_S7kO0uTw
-
server_id
1296544633794461808
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SynapseMBeta.exedescription pid Process procid_target PID 2328 wrote to memory of 792 2328 SynapseMBeta.exe 31 PID 2328 wrote to memory of 792 2328 SynapseMBeta.exe 31 PID 2328 wrote to memory of 792 2328 SynapseMBeta.exe 31