Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 08:39
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
cd92dc0ece8c10cd8ba6a5590ecb8408
-
SHA1
dbbea74031adf85e0356772e2c58d3152e9bd357
-
SHA256
7cce0dc8fe5f2449e4d4357f3bfb759e3ea454735e2e413d03c84526c8002c40
-
SHA512
a94f2a1030f8eb282a504312e9623c23f00d4d649a3e1568bfedc276da307a542888945f2ad3494150cbe29e0be95361b0f90ec461a71eccace26a233ba5778d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+NPIC:5Zv5PDwbjNrmAE+dIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxMDIyNTc5MzIzNzkwOTUyNA.GO7zwM.BLjqjzDn0kcO7VsPUa5W6XeYU7X3NlqlEDHvk8
-
server_id
1160151795734163526
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 20 discord.com 24 discord.com 25 discord.com 32 discord.com 11 discord.com 13 discord.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Client-built.exeAUDIODG.EXEdescription pid Process Token: SeDebugPrivilege 2944 Client-built.exe Token: 33 4612 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4612 AUDIODG.EXE