Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 21:04
Behavioral task
behavioral1
Sample
logger v1.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
logger v1.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
logger v1.exe
-
Size
78KB
-
MD5
f1ffc2fa8a465e4bd24cd05021ba298b
-
SHA1
c9bda65eb3d94b56838aea98745a33f412a435ad
-
SHA256
9ca545ac2728ff10ef06d7eba42ffd1f5b27355c492f131668de82336b589232
-
SHA512
21f9da50cd6e7e3c2930903b8fba997583620b46c01a478b7033b6578b95f50dac6915c14982de4e5c6f4e0b796cc9f70c8df7bd3c31102e1fadeac321df2f69
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+FPIC:5Zv5PDwbjNrmAE+VIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxMzkxNTc4NjI0NjQ4ODA3NQ.G1jyFT.icV6dfHPP-379qiHUUR3NgR8bT8s4Qw4Hgv5zE
-
server_id
1313915888793157672
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2912 1648 logger v1.exe 28 PID 1648 wrote to memory of 2912 1648 logger v1.exe 28 PID 1648 wrote to memory of 2912 1648 logger v1.exe 28