Overview
overview
10Static
static
10Makala Executor.zip
windows7-x64
1Makala Executor.zip
windows10-2004-x64
1Makala Exe...ox.dll
windows7-x64
1Makala Exe...ox.dll
windows10-2004-x64
1Makala Exe...I2.dll
windows7-x64
1Makala Exe...I2.dll
windows10-2004-x64
1Makala Exe...er.exe
windows7-x64
10Makala Exe...er.exe
windows10-2004-x64
10Makala Exe...config
windows7-x64
3Makala Exe...config
windows10-2004-x64
3Makala Exe...la.pdb
windows7-x64
3Makala Exe...la.pdb
windows10-2004-x64
3Makala Exe...UI.dll
windows7-x64
1Makala Exe...UI.dll
windows10-2004-x64
1Makala Exe...no.dll
windows7-x64
1Makala Exe...no.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...sh.dll
windows7-x64
1Makala Exe...sh.dll
windows10-2004-x64
1Makala Exe...td.dll
windows7-x64
1Makala Exe...td.dll
windows10-2004-x64
1Makala Exe...er.txt
windows7-x64
1Makala Exe...er.txt
windows10-2004-x64
1Makala Exe...is.dll
windows7-x64
1Makala Exe...is.dll
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 23:48
Behavioral task
behavioral1
Sample
Makala Executor.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Makala Executor.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Makala Executor/Guna.UI2.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Makala Executor/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Makala Executor/Makala.config
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Makala Executor/Makala.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Makala Executor/Makala.pdb
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Makala Executor/Makala.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Makala Executor/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Makala Executor/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Makala Executor/bin/Xeno.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Makala Executor/bin/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Makala Executor/bin/xxhash.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Makala Executor/bin/xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Makala Executor/bin/zstd.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Makala Executor/bin/zstd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Makala Executor/cver.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Makala Executor/cver.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Makala Executor/cxapis.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Makala Executor/cxapis.dll
Resource
win10v2004-20241007-en
General
-
Target
Makala Executor/Makala Bootstrapper.exe
-
Size
78KB
-
MD5
6a7ea29ef2fb6c36471d0e055b81f084
-
SHA1
168ba0b3c3f51d89b4b3e5be7c91a813a51387c2
-
SHA256
cd562416060b65c4e342e62169e7d6136f7043e5252943b1a7033d9160ee383a
-
SHA512
f9ad092b14d16c13ddc1e791147efc2edfbe875865ee523bbb190ee851725ae3c909eabd15f9ad193d5cbedefa46802a886713cc471f0c2308e51fae61e9256e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTMxODM1MTU3NDYzNjAzNjEyNg.GOjBDm.fj5GQTX1yf12bG6cA-jFqOCZzVLbT2a7KZ8L7Y
-
server_id
1031700632450641981
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 956 wrote to memory of 1972 956 Makala Bootstrapper.exe 31 PID 956 wrote to memory of 1972 956 Makala Bootstrapper.exe 31 PID 956 wrote to memory of 1972 956 Makala Bootstrapper.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Makala Executor\Makala Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\Makala Executor\Makala Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 956 -s 5962⤵PID:1972
-