Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 20:00
Behavioral task
behavioral1
Sample
FortniteExternalBase/util/loadup.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FortniteExternalBase/util/loadup.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FortniteExternalBase/vdm/libary.hpp.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
FortniteExternalBase/vdm/libary.hpp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
x64/Release/quantum.dev.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
x64/Release/quantum.dev.exe
Resource
win10v2004-20241007-en
General
-
Target
FortniteExternalBase/vdm/libary.hpp.exe
-
Size
78KB
-
MD5
b59a3035631d7d9740f6bbeee9f9af7a
-
SHA1
63dd307c35e27216f00a5f915fc06c74b3124dd6
-
SHA256
98ac7772969edb1cec6110cf07ecbd151f008d62373b6fe8b9099a0ad68bf2eb
-
SHA512
8ac564658284976f614863b8a17faec37cdf014a9188bccdbe3e2e1ad806b7941c107269febad650c41bcfb31e75a8d324ebde7be449858f87841324aa050916
-
SSDEEP
1536:lIWOBaZ84c6gEz5De2FzNDnghTAsKFbOZGdndxRKDIZ8o1l8ApbDNr1+uexCxoKG:lIWOBaZ84c6gEz5De2FzNDnghTdWd7Kv
Malware Config
Extracted
discordrat
-
discord_token
MTMxMzk0OTc0NTY1NTQ0NzY0Mw.GvqYM1.8ZwhOILcM3Ijsfbzqc8F-Cy7wfV5wKSv-BMD0I
-
server_id
1313949691574226985
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 10 discord.com 11 discord.com 26 discord.com 27 discord.com 36 discord.com 19 discord.com 33 raw.githubusercontent.com 34 raw.githubusercontent.com 35 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3388 libary.hpp.exe