Overview
overview
10Static
static
10Unconfirme...51.zip
windows7-x64
1Unconfirme...51.zip
windows10-2004-x64
1DiscordRAT...DME.md
windows7-x64
3DiscordRAT...DME.md
windows10-2004-x64
3DiscordRAT...at.exe
windows7-x64
10DiscordRAT...at.exe
windows10-2004-x64
10DiscordRAT...er.exe
windows7-x64
3DiscordRAT...er.exe
windows10-2004-x64
3DiscordRAT...ib.dll
windows7-x64
1DiscordRAT...ib.dll
windows10-2004-x64
1Analysis
-
max time kernel
102s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 22:55
Behavioral task
behavioral1
Sample
Unconfirmed 806051.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Unconfirmed 806051.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DiscordRAT_Build-main/README.md
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
DiscordRAT_Build-main/README.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
DiscordRAT_Build-main/Release/Discord rat.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
DiscordRAT_Build-main/Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DiscordRAT_Build-main/builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
DiscordRAT_Build-main/builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
DiscordRAT_Build-main/dnlib.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
DiscordRAT_Build-main/dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
DiscordRAT_Build-main/README.md
-
Size
118B
-
MD5
27207b5000f32af44440789416183133
-
SHA1
b10b6c2f9921cbb0b95f9d67fcbc5d98d0f28d0a
-
SHA256
5d99668ed7db7a68606497fd480ea319ca12802e18505cec051008556529c0a1
-
SHA512
f19931f5d3206a7e7e97f35225de32defe5d5320d476bd9402d74c414b024669cc6b3f2ea08027399a0879a7de3b3c2692f404804610d51bf8c105e883af8f8a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2764 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2764 AcroRd32.exe 2764 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2820 1456 cmd.exe 30 PID 1456 wrote to memory of 2820 1456 cmd.exe 30 PID 1456 wrote to memory of 2820 1456 cmd.exe 30 PID 2820 wrote to memory of 2764 2820 rundll32.exe 31 PID 2820 wrote to memory of 2764 2820 rundll32.exe 31 PID 2820 wrote to memory of 2764 2820 rundll32.exe 31 PID 2820 wrote to memory of 2764 2820 rundll32.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md1⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\DiscordRAT_Build-main\README.md"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55eb25e1fb83a4bdfe2cc824b3787f929
SHA1aff0be75a1d4f746f9ad21a8000ca10d13e00623
SHA256b91d5b1ed8ad393053bf91d5dd7ef6f48b8813a599091c77a5527a6492868a33
SHA512f9ef80d3351f03ba9c63139cc0ce49bee986dcadb254dae19f85ebd574ef326b9fc6fdeac62da731bc63ff4e262cefc3c830bc4e516de2b3bf57aa62627c7bf4