Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-11-2024 19:58
Behavioral task
behavioral1
Sample
dpsanalyzer.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dpsanalyzer.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
dpsanalyzer.exe
-
Size
78KB
-
MD5
7a0b50dfa81471ef28bada42f9fbb32e
-
SHA1
4c10381b9a9603fc50046e4f74cf84482ef07958
-
SHA256
bb5245457e1af7776308724d3eb6981e650f716eae2929e8042c18e86bf26e2a
-
SHA512
c20a0dbbb642fa62a11c3f489b1762c2389f6f8611071caf89d39d2beaf150a312b9d2b3be6c67555dbf92ddf183aec8ef6fa8a6c5d71e11b02c4b25fa1b34d0
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+BPIC:5Zv5PDwbjNrmAE+RIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMwODExMzc5ODUxNDYxMDI0Ng.GKIvuY.CyDijnBsn0UftGwjKwdobdz4Hu9LFigLmxLapE
-
server_id
1308114080418107413
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1664 wrote to memory of 2804 1664 dpsanalyzer.exe 30 PID 1664 wrote to memory of 2804 1664 dpsanalyzer.exe 30 PID 1664 wrote to memory of 2804 1664 dpsanalyzer.exe 30