Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 17:01
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
48c0778c84f2c0e6d20322f6214bccde
-
SHA1
dec21a168fe089664105583d7ae69812977426c6
-
SHA256
1f7273b6ab26d2693c2068183341f0895773c1e72d214ebd8b5dd3d7a9155942
-
SHA512
4c60d9b26e205fa0f349f955cc3e2703822f20a4d13a2c116ad667e6288e9a484cf466836764642b64a108df569e42e8ab1fbc74f78e34e229ca4fda1746ea60
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+lPIC:5Zv5PDwbjNrmAE+1IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxODI1OTA0MTg2NDEyNjQ3NA.Gz1qSc.Ei5O_SMuX9DWfjRafJGpKAjywBPvy1N0wJlYD4
-
server_id
1318259041864126474
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 392 wrote to memory of 2892 392 Client-built.exe 29 PID 392 wrote to memory of 2892 392 Client-built.exe 29 PID 392 wrote to memory of 2892 392 Client-built.exe 29