Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 00:06
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
d06c1721d9f432d86b1d4818f43d00d0
-
SHA1
3284ae26a6ab5fd838afdc35be9d42009b18a306
-
SHA256
bd6862f00d76ade173f52a2800acf9bff164127797a67996cb6647f23eeaa785
-
SHA512
73c179b60501bfe3a8fa1def800344c69b6bc60398bcdadbbcab53671c85767e672d6109e8f2127594a5a0c749ea948cc764f0bebb522434950a2ebeb4b7d0c4
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+mYPIC:5Zv5PDwbjNrmAE+m8IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNjkxMTAxOTExNjg1NTMwNw.GxkZJw.6AUOsIK_koTSvVmMFQbfwWQRheNMvHF2jYnlys
-
server_id
1316911015295713350
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 948 Client-built.exe Token: SeDebugPrivilege 3500 Client-built.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:948
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3500