Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 19:19
Behavioral task
behavioral1
Sample
testpng.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
testpng.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
testpng.exe
-
Size
78KB
-
MD5
98f6e65be9a95b6a0ccf9a5aacf89de5
-
SHA1
6d4e66094d5e332457d62ed2b9910bc229240d58
-
SHA256
23bb32996f7d5e1f33ab05600c29642956edc6b262304035efab73f3b86feec9
-
SHA512
7f05f2dff4a20415ffcc9cd3c0fb2b74499aca9ab59f73817a66e68bcf74b9915c908f4b076abbf6083d4cd29d88e3c2e2f0cf855068b66e112444ec7949284e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ayPIC:5Zv5PDwbjNrmAE+a+IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNzE1MTMxMDMxMDY3NDQ1Mw.GmAoQR.n9xRqZURsT5g3LGTtKYNBSjio3XuQpmLH7RLO0
-
server_id
1317163923350487151
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2520 2316 testpng.exe 31 PID 2316 wrote to memory of 2520 2316 testpng.exe 31 PID 2316 wrote to memory of 2520 2316 testpng.exe 31