Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:13
Behavioral task
behavioral1
Sample
c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe
Resource
win10v2004-20241007-en
General
-
Target
c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe
-
Size
78KB
-
MD5
ed9cadad24b9d3c1c72030782ba61583
-
SHA1
343a1d94dc1922ce15669eeda69b3c92057ccc9c
-
SHA256
c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe
-
SHA512
a4e0b5436bc5239f428a5a94aa05b69248185bd5a5fccbd5636ff8346c56931228741dd1eedcf3e10bc0e49948778d213b87b3766f72d4196b2ab09fd3b2e60c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+zPICp:5Zv5PDwbjNrmAE+rICp
Malware Config
Extracted
discordrat
-
discord_token
MTMwNDUyNjgyMjkzMDc3NjEzNQ.GwiOJr.rp47kAwqUW89XVZW2-vlwDd1DYTfbVY8fbo0r8
-
server_id
1304528345966444544
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1868 2596 c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe 30 PID 2596 wrote to memory of 1868 2596 c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe 30 PID 2596 wrote to memory of 1868 2596 c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe"C:\Users\Admin\AppData\Local\Temp\c4da36caa31fd42299bd6f6a9cb55e9b2483eb58ca5ce4e0d51d68d2d5263cbe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2596 -s 6002⤵PID:1868
-