Analysis
-
max time kernel
18s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 19:11
Behavioral task
behavioral1
Sample
Shiroku.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Shiroku.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Shiroku.exe
-
Size
78KB
-
MD5
670fca098e8eb2dc3a9dfe676accce48
-
SHA1
1cf1cca180ecee2f2f027d8ed9d4a375fe4ba5cf
-
SHA256
17d2a00f486e9f6aff348c7528fd49b59527661b8b012e08cfd629467930ba6e
-
SHA512
23ec447fec421d70ac910e5b4b639ed5fb081f7398a074443f4959516cae4ae981b1ac190187dde889f975fb2ac27795697f17ecbd78c130d04a84e083cdbbe0
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxMTM2OTUzNjQ1MjQzMTg4Mg.G-gxB9.YEQtR53nPmfGIrIfr7r6v6pYcS-y6sD07JFL74
-
server_id
1311367307922247813
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
Processes:
flow ioc 20 discord.com 34 discord.com 35 discord.com 8 discord.com 9 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Shiroku.exedescription pid Process Token: SeDebugPrivilege 2644 Shiroku.exe