Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 02:37
Behavioral task
behavioral1
Sample
520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe
Resource
win10v2004-20241007-en
General
-
Target
520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe
-
Size
78KB
-
MD5
74690cdf2edc26f42d100325241e1117
-
SHA1
6905ea513cf4a9fcf94f5efff1933fdaf5e980f5
-
SHA256
520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4
-
SHA512
1af915c6d421e5a3bb003985e513eaeb9a101a2006a2e338ae172da145ad98b2139bbca7e42a18b926ed7b489f6dcb347e85e6695f2f60ac7f80b0816110f255
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LPIC:5Zv5PDwbjNrmAE+jIC
Malware Config
Extracted
discordrat
-
discord_token
MTIwMjY2NDA1NTE5ODg0NzAzNw.GBgvm-.FTCvKdBZdhUCywGcaCtSocdcqrjxGR0rEILNeA
-
server_id
1202543313526464574
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2156 2380 520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe 30 PID 2380 wrote to memory of 2156 2380 520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe 30 PID 2380 wrote to memory of 2156 2380 520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe"C:\Users\Admin\AppData\Local\Temp\520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2380 -s 6002⤵PID:2156
-