Analysis
-
max time kernel
100s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 17:56
Behavioral task
behavioral1
Sample
KINGDOM/CE_punch.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KINGDOM/CE_punch.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
KINGDOM/NewX.vmp.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
KINGDOM/NewX.vmp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
KINGDOM/lua53-64.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
KINGDOM/lua53-64.dll
Resource
win10v2004-20241007-en
General
-
Target
KINGDOM/CE_punch.exe
-
Size
78KB
-
MD5
8830b86f6d0f948239faede686f17a90
-
SHA1
aad1f9d169f47d3fdc3cbf72b148e9e579972376
-
SHA256
6cfa953a75f49a0c2b10dde540e925097c9fd9c6eac3dc3383da59fa1c122c00
-
SHA512
3b3ccb74da1e172c6f1ae08fe02669dafa9f946730574ecd10f1187776b3c3917efaaf56814ef8fca42c8c2c7c38425bdc27062d7589a102077755f270cdb2c4
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+cPIC:5Zv5PDwbjNrmAE+QIC
Malware Config
Extracted
discordrat
-
discord_token
MTE5ODU2NTc1MDg2OTM0ODQ4Nw.GEaDVF.SoDWe_1YPV_HyqdlifJ_rW_Ht63qAP64AVKB3A
-
server_id
1178732805065281556
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 CE_punch.exe