Overview
overview
10Static
static
10Unconfirme...57.zip
windows7-x64
1Unconfirme...57.zip
windows10-2004-x64
1DiscordRAT...DME.md
windows7-x64
3DiscordRAT...DME.md
windows10-2004-x64
3DiscordRAT...at.exe
windows7-x64
10DiscordRAT...at.exe
windows10-2004-x64
10DiscordRAT...er.exe
windows7-x64
3DiscordRAT...er.exe
windows10-2004-x64
3DiscordRAT...ib.dll
windows7-x64
1DiscordRAT...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 03:37
Behavioral task
behavioral1
Sample
Unconfirmed 115457.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Unconfirmed 115457.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DiscordRAT_Build-main/README.md
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
DiscordRAT_Build-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DiscordRAT_Build-main/Release/Discord rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
DiscordRAT_Build-main/Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DiscordRAT_Build-main/builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DiscordRAT_Build-main/builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DiscordRAT_Build-main/dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DiscordRAT_Build-main/dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
DiscordRAT_Build-main/README.md
-
Size
118B
-
MD5
27207b5000f32af44440789416183133
-
SHA1
b10b6c2f9921cbb0b95f9d67fcbc5d98d0f28d0a
-
SHA256
5d99668ed7db7a68606497fd480ea319ca12802e18505cec051008556529c0a1
-
SHA512
f19931f5d3206a7e7e97f35225de32defe5d5320d476bd9402d74c414b024669cc6b3f2ea08027399a0879a7de3b3c2692f404804610d51bf8c105e883af8f8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2868 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 AcroRd32.exe 2868 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2524 1620 cmd.exe 31 PID 1620 wrote to memory of 2524 1620 cmd.exe 31 PID 1620 wrote to memory of 2524 1620 cmd.exe 31 PID 2524 wrote to memory of 2868 2524 rundll32.exe 33 PID 2524 wrote to memory of 2868 2524 rundll32.exe 33 PID 2524 wrote to memory of 2868 2524 rundll32.exe 33 PID 2524 wrote to memory of 2868 2524 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD56dc523bc2c74c558527b96df6ed20570
SHA1fe595d5db1d57e9fbf0f23bee9fe6984912bebfa
SHA256cbb0294e6b6c04be7961b1f381239eec21a10dcd9df25c0d3b3da51bb7ea4953
SHA5126a5a9db2eb335cb7da27468e2a4d9fa7d0b1b30cf66a898eacae98ea111bc05394dab4ec8021996e86850e8c0fa8a1e98dbb1d3f9130188e2127c1fe0677af78