Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-10-2024 17:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Discord.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Discord.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Discord.exe
-
Size
51KB
-
MD5
85f1a70f2760fc2b1c9dd2e11d178548
-
SHA1
c92415eb189ebb19efa29a1be6eeea7421d2eabc
-
SHA256
9c3a2642864d1680716134111aa3ce37cf1f99829a4d8301b4972230358389ec
-
SHA512
f5a8e36d502992f733dd5473d6146bd0a1b3f17a7377b62f2f628318cccf9cec236ea6bac268d9a4377ea12cd4d984f4b59553d4c5de2481bcb710f20d5a2aef
-
SSDEEP
1536:eblM7Vomh/iB3O0jMOnC5zMHSd94Mu9/f7WWLEI:ebG71/a3NPCOQE7Z
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5Njg5NDEwMjY0NTkwMzQwMA.GffxcT.wWuk4gdi5T-RNzCLfFQ4XgAEMO4ZjpXcRu5E5Y
-
server_id
1293738586679672945
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Discord.exedescription pid process target process PID 2128 wrote to memory of 2816 2128 Discord.exe WerFault.exe PID 2128 wrote to memory of 2816 2128 Discord.exe WerFault.exe PID 2128 wrote to memory of 2816 2128 Discord.exe WerFault.exe