Analysis
-
max time kernel
273s -
max time network
286s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-11-2024 17:34
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Release/Discord rat.exe
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
dnlib.dll
Resource
win11-20241007-en
Errors
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
93f25fd89524c78ba07d5465e4cd335f
-
SHA1
9abebdf8fe6c710edf86a8b0fa18a853d929900d
-
SHA256
445efaeb06cd5448531b3243c5ae2c1af1458545ba0059fdd6fe9466d23423ea
-
SHA512
fe0f000f743ba91cd7cfe14a8cdf2a64f2b6401c4514aa00818c932cee61c958af1434dae7fcc7db842cda6c576f1f14dca0653c8b5c8dd6fafb14d68131d97b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+GPIC:5Zv5PDwbjNrmAE+iIC
Malware Config
Extracted
discordrat
-
discord_token
MTI5OTEzNTM5MDMyOTg2ODM4MA.GSXT4J.l1NwkThNC0WguODQ7jZyklX5sQTedQ0j6SqCuY
-
server_id
1215457022309306480
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
Processes:
flow ioc 11 discord.com 1 discord.com 5 discord.com 8 discord.com 10 discord.com 12 raw.githubusercontent.com 3 discord.com 7 raw.githubusercontent.com 9 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 1756 Client-built.exe