Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 18:49
Behavioral task
behavioral1
Sample
mta.exe
Resource
win7-20240708-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
mta.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
mta.exe
-
Size
98KB
-
MD5
778dce14368e8b1105544c43ce09d2f1
-
SHA1
81c7cc17d48b8c5e6e5b9cc1efc8bbae1646dcb0
-
SHA256
1d184c635a032625f10639ec3458a6f8d0a36a6a82078a11b820924f39056080
-
SHA512
31a517a024726bef90c60c05173852de117e27960e981ec92456e6a3e4c0b6ac50437b8bfd2ced7afbad2a81c3e00a4c9bd5622af2236f3ae37856d6fd9d4aab
-
SSDEEP
1536:Vic45PApy/vpjAnT9ZqzY4r5VVZDAcE3VCQfwbJ6Pr5+NzxCxoKV6+UyNV:AxApgR8T9EE4r5n8rwbJ6Pr5+zNyj
Score
10/10
Malware Config
Signatures
-
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/memory/524-1-0x000000013F940000-0x000000013F95C000-memory.dmp disable_win_def -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 524 wrote to memory of 1972 524 mta.exe 31 PID 524 wrote to memory of 1972 524 mta.exe 31 PID 524 wrote to memory of 1972 524 mta.exe 31