Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 16:23
Behavioral task
behavioral1
Sample
NitroGenV3.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
NitroGenV3.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
NitroGenV3.exe
-
Size
78KB
-
MD5
508bbb8bf4efac317cfd1d9532bdebfe
-
SHA1
a145b6ab1d5543097ca09c7b936d532f718bc087
-
SHA256
1fd008d0c903210ebb97f0c7d15a2b03bbe28e5fc3ac296e5482f6926e3ee17e
-
SHA512
7e3dd45677be1df9c8c8a6e65e75454a9798eddaf8a6eb2db8207fe4f6e99378a7e87e5d8ee23dae403854aa19c0122ed97668567909cd60db6f6d1f376036f4
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+hPIC:5Zv5PDwbjNrmAE+xIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE5Njg1MDA0NzU2NDkxNDcxOA.GrJUg1.lgWsOKN3lnatoZgt8R8bNns8frpVGolFi2OtF8
-
server_id
1196851278773485601
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
NitroGenV3.exedescription pid Process procid_target PID 2700 wrote to memory of 2844 2700 NitroGenV3.exe 31 PID 2700 wrote to memory of 2844 2700 NitroGenV3.exe 31 PID 2700 wrote to memory of 2844 2700 NitroGenV3.exe 31