Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 11:36
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
7d35a10226313ac34c36503fd9b4d30e
-
SHA1
5bd1c5e481dfc6787ff97df3878db3fb517bd91e
-
SHA256
834093c6a0cd72d589318943ead41e621cc90914826769c612f375041b98e8fc
-
SHA512
6a1c94ae77d413493eab24dca69878d255b3100d625004b18c9ee022ab8661781ff08dd8dc3e9c2a78e3df98a514dd662e01379e664e63e90a97488686ff4a0c
-
SSDEEP
1536:82WjO8XeEXFi5P7v88wbjNrfxCXhRoKV6+V+pPIC:8Zs5PDwbjNrmAE+ZIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzY4MDkyMDc5MDE3NTgwNQ.GvWIUl.SL95yh3MaC6OYD2D4NgjrSm6W9OdQaPX8n7jeY
-
server_id
MTMxNzY4MDkyMDc5MDE3NTgwNQ.GvWIUl.SL95yh3MaC6OYD2D4NgjrSm6W9OdQaPX8n7jeY
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2044 1484 Client-built.exe 31 PID 1484 wrote to memory of 2044 1484 Client-built.exe 31 PID 1484 wrote to memory of 2044 1484 Client-built.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1484 -s 5962⤵PID:2044
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2632