Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 19:56
Behavioral task
behavioral1
Sample
FortniteExternalBase/util/loadup.js
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FortniteExternalBase/util/loadup.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FortniteExternalBase/vdm/libary.hpp.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
FortniteExternalBase/vdm/libary.hpp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
x64/Release/quantum.dev.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
x64/Release/quantum.dev.exe
Resource
win10v2004-20241007-en
General
-
Target
FortniteExternalBase/vdm/libary.hpp.exe
-
Size
78KB
-
MD5
b59a3035631d7d9740f6bbeee9f9af7a
-
SHA1
63dd307c35e27216f00a5f915fc06c74b3124dd6
-
SHA256
98ac7772969edb1cec6110cf07ecbd151f008d62373b6fe8b9099a0ad68bf2eb
-
SHA512
8ac564658284976f614863b8a17faec37cdf014a9188bccdbe3e2e1ad806b7941c107269febad650c41bcfb31e75a8d324ebde7be449858f87841324aa050916
-
SSDEEP
1536:lIWOBaZ84c6gEz5De2FzNDnghTAsKFbOZGdndxRKDIZ8o1l8ApbDNr1+uexCxoKG:lIWOBaZ84c6gEz5De2FzNDnghTdWd7Kv
Malware Config
Extracted
discordrat
-
discord_token
MTMxMzk0OTc0NTY1NTQ0NzY0Mw.GvqYM1.8ZwhOILcM3Ijsfbzqc8F-Cy7wfV5wKSv-BMD0I
-
server_id
1313949691574226985
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1592 2148 libary.hpp.exe 31 PID 2148 wrote to memory of 1592 2148 libary.hpp.exe 31 PID 2148 wrote to memory of 1592 2148 libary.hpp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\FortniteExternalBase\vdm\libary.hpp.exe"C:\Users\Admin\AppData\Local\Temp\FortniteExternalBase\vdm\libary.hpp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2148 -s 5962⤵PID:1592
-