Overview
overview
10Static
static
10Makala Exe...ox.dll
windows7-x64
1Makala Exe...ox.dll
windows10-2004-x64
1Makala Exe...I2.dll
windows7-x64
1Makala Exe...I2.dll
windows10-2004-x64
1Makala Exe...er.exe
windows7-x64
10Makala Exe...er.exe
windows10-2004-x64
10Makala Exe...UI.dll
windows7-x64
1Makala Exe...UI.dll
windows10-2004-x64
1Makala Exe...no.dll
windows7-x64
1Makala Exe...no.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...sh.dll
windows7-x64
1Makala Exe...sh.dll
windows10-2004-x64
1Makala Exe...td.dll
windows7-x64
1Makala Exe...td.dll
windows10-2004-x64
1Makala Exe...is.dll
windows7-x64
1Makala Exe...is.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 23:30
Behavioral task
behavioral1
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Makala Executor/Guna.UI2.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Makala Executor/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Makala Executor/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Makala Executor/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Makala Executor/bin/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Makala Executor/bin/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Makala Executor/bin/xxhash.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Makala Executor/bin/xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Makala Executor/bin/zstd.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Makala Executor/bin/zstd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Makala Executor/cxapis.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Makala Executor/cxapis.dll
Resource
win10v2004-20241007-en
General
-
Target
Makala Executor/Makala Bootstrapper.exe
-
Size
78KB
-
MD5
6a7ea29ef2fb6c36471d0e055b81f084
-
SHA1
168ba0b3c3f51d89b4b3e5be7c91a813a51387c2
-
SHA256
cd562416060b65c4e342e62169e7d6136f7043e5252943b1a7033d9160ee383a
-
SHA512
f9ad092b14d16c13ddc1e791147efc2edfbe875865ee523bbb190ee851725ae3c909eabd15f9ad193d5cbedefa46802a886713cc471f0c2308e51fae61e9256e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTMxODM1MTU3NDYzNjAzNjEyNg.GOjBDm.fj5GQTX1yf12bG6cA-jFqOCZzVLbT2a7KZ8L7Y
-
server_id
1031700632450641981
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2692 2120 Makala Bootstrapper.exe 30 PID 2120 wrote to memory of 2692 2120 Makala Bootstrapper.exe 30 PID 2120 wrote to memory of 2692 2120 Makala Bootstrapper.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Makala Executor\Makala Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Makala Executor\Makala Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2120 -s 5962⤵PID:2692
-