Analysis
-
max time kernel
51s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 13:47
Behavioral task
behavioral1
Sample
Discord rat.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
Discord rat.exe
-
Size
90KB
-
MD5
d74728a955861daf303ff42c7f572d16
-
SHA1
a73b4d871a4caec1700349de9b5f7dbf4ba59f7b
-
SHA256
1f3b8599d811004b6d52d543e451555944c3c4dc2893d04a370a0874e99c82af
-
SHA512
73c271de7061e53b91079636d99f1967ce922bf47c14539569b2f0f3a9b6628bc4cc1fd9a7d7cb1e10bdfc95c8ce49e0a0f3a815cf5810f44a5c2b35ba116e69
-
SSDEEP
1536:ibPjt72uOFmYskRPUAqtBTldwX0bpAkAfLgbGNrk+uexCxoKV6+fEX85:EjtyuOFpskpgBTlukQgbGNrk+bSEXQ
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMwOTg3NTA0MzA1MTg5Njk1NA.GTR-3U.C7tazMXoRaSR--tVDMbQdoDKBw2f8bLXItZIRo
-
server_id
1309876526615101530
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
flow ioc 14 discord.com 24 discord.com 29 discord.com 54 discord.com 55 discord.com 58 discord.com 17 discord.com 30 discord.com 36 raw.githubusercontent.com 37 raw.githubusercontent.com 56 raw.githubusercontent.com 38 discord.com 39 discord.com 57 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 628 Discord rat.exe