Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2024 15:52

General

  • Target

    b3bf1cabe7e98e7120e69d3d5c63cea55dd9345aa9facae7a97a84134eaf1984.exe

  • Size

    78KB

  • MD5

    047501531983682c470ca7560077477a

  • SHA1

    99d90e9b66320b9c08e9633607f15743f7d4af7c

  • SHA256

    b3bf1cabe7e98e7120e69d3d5c63cea55dd9345aa9facae7a97a84134eaf1984

  • SHA512

    47e76b0d14c5d2f601b087413bfa9ba6a00ea11a9ec6666e4787c926b0a2df92da313ed4fe6736913d623de21683ea876006eb43d75a10cd5902be6a2b662bab

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+JPIC:5Zv5PDwbjNrmAE+5IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxMjYwNjY0NDYwOTM1NTg2Nw.GmiBbD.BxOkmi6_jSm3KiEBfaoI7z9GP_TE4zxloC3fjo

  • server_id

    1312606556201681018

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b3bf1cabe7e98e7120e69d3d5c63cea55dd9345aa9facae7a97a84134eaf1984.exe
    "C:\Users\Admin\AppData\Local\Temp\b3bf1cabe7e98e7120e69d3d5c63cea55dd9345aa9facae7a97a84134eaf1984.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2100 -s 596
      2⤵
        PID:2128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2100-0-0x000007FEF5EB3000-0x000007FEF5EB4000-memory.dmp

      Filesize

      4KB

    • memory/2100-1-0x000000013F4E0000-0x000000013F4F8000-memory.dmp

      Filesize

      96KB

    • memory/2100-2-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp

      Filesize

      9.9MB

    • memory/2100-3-0x000007FEF5EB0000-0x000007FEF689C000-memory.dmp

      Filesize

      9.9MB