Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 17:54
Behavioral task
behavioral1
Sample
CoolCar.png.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
CoolCar.png.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
CoolCar.png.exe
-
Size
78KB
-
MD5
26bbe8da36187e681251e537ee02a5d6
-
SHA1
72f37404ebe8c740b5b66b00770a1bec23801171
-
SHA256
64c4cb4614d5870771cf59554e7332d5ec4c77aca174e10f8567a75f16aeecee
-
SHA512
a6cd581dc302119bca3f8481f7b79f02164490f3baeb49c74f78cc739c15c3538eefe59d4cf8b6338b93f53e1fa8dc40c1ba3b12c2020c83649584f55964313d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+vPIC:5Zv5PDwbjNrmAE+XIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxODczNjUwNzU4NjIyMDA4NA.GBEWK9.B_HF2HutCcnkHI0nA0ISUDKNYU8Or_bTyOcliY
-
server_id
1318726003320950815
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2236 2244 CoolCar.png.exe 30 PID 2244 wrote to memory of 2236 2244 CoolCar.png.exe 30 PID 2244 wrote to memory of 2236 2244 CoolCar.png.exe 30