Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 19:47
Behavioral task
behavioral1
Sample
freenitro.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
freenitro.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
freenitro.exe
-
Size
78KB
-
MD5
b58f8ad5ecec74a0a9c6e1366927ff20
-
SHA1
9d0a89cf9c29a34190ddc969cf83aa68f8a0b375
-
SHA256
a9a9c93050215054b78f235c5f8169bc7f94524ac8f31233d6848e2b291b2ec6
-
SHA512
d24fbc4dfa4eb333f2d18689ec711c629c580956653624d66068b161f864cdbdc52d4952b017238a2a42287a15c05455a7627ab6f8252af2b364559306b7ee51
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+MPIC:5Zv5PDwbjNrmAE+gIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNzE1MTMxMDMxMDY3NDQ1Mw.Gq-B5x.yAU663nmqjWG6nu7dT187nxcCqhsp-ardUfoX8
-
server_id
1317163923350487151
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2204 2100 freenitro.exe 30 PID 2100 wrote to memory of 2204 2100 freenitro.exe 30 PID 2100 wrote to memory of 2204 2100 freenitro.exe 30