Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:40
Behavioral task
behavioral1
Sample
AIMr.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
AIMr.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
AIMr.exe
-
Size
78KB
-
MD5
67e0e6dc1dab2b50e036948470c1bf5f
-
SHA1
f77d90748617aa516d95f06a6ef4fa511d9739fe
-
SHA256
07c46b658c76254d83cccd35b28ee12f948ec01b1e24b12eefe4d93752ddb8a1
-
SHA512
76b30103fa0612c11044543d5be4e36ad0340a3f1cdf91955e01911e886b427302dfa56972d9c9e554df8fbd30ae22b48293bd52241215df36a82022aea6959a
-
SSDEEP
1536:F2WjO8XeEXFd5P7v88wbjNrfxCXhRoKV6+V+rPIC:FZz5PDwbjNrmAE+DIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
ODgxNzQzODc5NTAwNTk5MzM3.Gz4jXn.nabvUjO4zX_jYK_mdMBrfdMRfCB5q240mJH-vo
-
server_id
1310387822045171713
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2848 wrote to memory of 1608 2848 AIMr.exe 30 PID 2848 wrote to memory of 1608 2848 AIMr.exe 30 PID 2848 wrote to memory of 1608 2848 AIMr.exe 30