Analysis
-
max time kernel
58s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 18:19
Behavioral task
behavioral1
Sample
Discord rat.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Discord rat.exe
-
Size
98KB
-
MD5
d069aee7c616e0a7a15fa4e7daa39df4
-
SHA1
6377089eadaf83365d9890e5af6175123119fcc6
-
SHA256
8948cc84af114230b00b119e2354563e68b5edb57f065ffef5d30a12aaf2d4e0
-
SHA512
0f25976cdf77e7b802807e98453a4b78ae4699b7109cffdf7539166de091a9d0f2bf178b63aebdc916d46bac8a7b175cd40101f88b1d504e103c982782215bc1
-
SSDEEP
3072:XxAAGnqL98A4jF+ishms3ydbJDPrt+zNM:BEHshms3ydblr
Malware Config
Extracted
discordrat
-
discord_token
TVRNeE5ESTROVEkzTmpBek56WTBOREk0T0EuR0ZFQjRhLjg0elpVVTJPQ1EzYnNBTGVuSVl5QjdNQ1NtVjZGSzVRVTM3NTYw
-
server_id
1316471819527524362
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/1484-1-0x000002BA1DAF0000-0x000002BA1DB0E000-memory.dmp disable_win_def -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 51 discord.com 7 discord.com 11 discord.com 18 discord.com 23 discord.com 24 discord.com 31 discord.com 50 discord.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp1FA8.tmp.png" Discord rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1484 Discord rat.exe Token: SeShutdownPrivilege 1484 Discord rat.exe