Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 20:37
Behavioral task
behavioral1
Sample
SynapseMBeta.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SynapseMBeta.exe
Resource
win10v2004-20241007-en
General
-
Target
SynapseMBeta.exe
-
Size
78KB
-
MD5
1d3c777126c5fba217784ae40065e7c4
-
SHA1
bcd0e895689b8462bcc03c02c158aaa78a9bc6d3
-
SHA256
bc668cea4faae0367cee9388267e905c6eb9d963c567313fa9da0b0d3d49ee72
-
SHA512
ffa01c74ca3393befa1b9e339e01732275637afa135ebc6654976b2055039922f3f1d1f415ed99902fbfffe5f04730146ac544e8ad9bb99c29551c65cb2e8396
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ZPIC:5Zv5PDwbjNrmAE+pIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5NjU1MzkxOTAxODY5Njc4NA.G6Nv51.MeUAqaMSRiGQfBdB9XTQ7dPID-ZwW_S7kO0uTw
-
server_id
1296544633794461808
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 88 discord.com 90 discord.com 42 discord.com 43 discord.com 51 discord.com 77 raw.githubusercontent.com 84 discord.com 85 discord.com 11 discord.com 28 discord.com 31 raw.githubusercontent.com 32 raw.githubusercontent.com 33 discord.com 44 discord.com 89 discord.com 9 discord.com 35 discord.com 41 discord.com 53 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4472 SynapseMBeta.exe