Analysis
-
max time kernel
1363s -
max time network
1143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-de -
resource tags
arch:x64arch:x86image:win10v2004-20241007-delocale:de-deos:windows10-2004-x64systemwindows -
submitted
30-10-2024 16:46
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20241007-de
windows10-2004-x64
3 signatures
1800 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
3e76fb97584ab1f2ec4cae5a9aaa7524
-
SHA1
35a6c88db766f754cbd88a6e4f1d00045d0f6bb3
-
SHA256
7f95f83a7d5f2d134899b6a40cb6aecfaf4110f13e0daad3e3c12722bf8ebd40
-
SHA512
7b562a37b8588263c32367d9c5696c77b9853f1e2ddaf1c9ea0729bf95671284fb221a196fee53ae4ab2595a194ab4fcb711c31c529097e9c961e9115ee37482
-
SSDEEP
1536:P2WjO8XeEXFV5P7v88wbjNrfxCXhRoKV6+V+ZPIC:PZ75PDwbjNrmAE+pIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTA5MzU1NjI1Mzc5MzQ2ODQxNw.G1qyJE.uQ5PfjnJsRHyezWJbJth9_tJAcY81lyt4gT8KI
-
server_id
1301224135770509414
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid Process Token: SeDebugPrivilege 1728 Client-built.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3448