Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 13:47
Behavioral task
behavioral1
Sample
Discord rat.exe
Resource
win10v2004-20241007-en
General
-
Target
Discord rat.exe
-
Size
90KB
-
MD5
d74728a955861daf303ff42c7f572d16
-
SHA1
a73b4d871a4caec1700349de9b5f7dbf4ba59f7b
-
SHA256
1f3b8599d811004b6d52d543e451555944c3c4dc2893d04a370a0874e99c82af
-
SHA512
73c271de7061e53b91079636d99f1967ce922bf47c14539569b2f0f3a9b6628bc4cc1fd9a7d7cb1e10bdfc95c8ce49e0a0f3a815cf5810f44a5c2b35ba116e69
-
SSDEEP
1536:ibPjt72uOFmYskRPUAqtBTldwX0bpAkAfLgbGNrk+uexCxoKV6+fEX85:EjtyuOFpskpgBTlukQgbGNrk+bSEXQ
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTg3NTA0MzA1MTg5Njk1NA.GTR-3U.C7tazMXoRaSR--tVDMbQdoDKBw2f8bLXItZIRo
-
server_id
1309876526615101530
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
Processes:
flow ioc 14 discord.com 24 discord.com 29 discord.com 54 discord.com 55 discord.com 58 discord.com 17 discord.com 30 discord.com 36 raw.githubusercontent.com 37 raw.githubusercontent.com 56 raw.githubusercontent.com 38 discord.com 39 discord.com 57 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Discord rat.exedescription pid process Token: SeDebugPrivilege 628 Discord rat.exe