Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-10-2024 20:20
Behavioral task
behavioral1
Sample
SynapseMBeta.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
SynapseMBeta.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
SynapseMBeta.exe
-
Size
78KB
-
MD5
1d3c777126c5fba217784ae40065e7c4
-
SHA1
bcd0e895689b8462bcc03c02c158aaa78a9bc6d3
-
SHA256
bc668cea4faae0367cee9388267e905c6eb9d963c567313fa9da0b0d3d49ee72
-
SHA512
ffa01c74ca3393befa1b9e339e01732275637afa135ebc6654976b2055039922f3f1d1f415ed99902fbfffe5f04730146ac544e8ad9bb99c29551c65cb2e8396
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ZPIC:5Zv5PDwbjNrmAE+pIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5NjU1MzkxOTAxODY5Njc4NA.G6Nv51.MeUAqaMSRiGQfBdB9XTQ7dPID-ZwW_S7kO0uTw
-
server_id
1296544633794461808
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
SynapseMBeta.exedescription pid Process procid_target PID 2400 wrote to memory of 2928 2400 SynapseMBeta.exe 30 PID 2400 wrote to memory of 2928 2400 SynapseMBeta.exe 30 PID 2400 wrote to memory of 2928 2400 SynapseMBeta.exe 30