Analysis

  • max time kernel
    98s
  • max time network
    148s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    22-12-2024 02:10

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    4344da0f93cb00d0a0395ccd490dff5b

  • SHA1

    322c65076354761b7517937d677bdc85d40ee18b

  • SHA256

    4c66099e37c6cf514f820282777ffa3ae8c1728ee0040045311473b022c533be

  • SHA512

    c53e73b4eb4a105f989065872ee5ff140ec266449b45b6309ecc47fe0587c99de6b91e820b974b4e6adc31e811d2699bb8a23a2a3a79c5342c13d7a89bbfd594

  • SSDEEP

    1536:R2WjO8XeEXFp5P7v88wbjNrfxCXhRoKV6+V+VPIC:RZn5PDwbjNrmAE+FIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    rdlvass3yUtTMuU0dwWtox7Zk4xXnH0vyV7l-0t0mQZz_Zl4hdoCTFn5ly-sZvfvi_2M

  • server_id

    1320185318841778279

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4936

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4936-0-0x00007FFEE85D3000-0x00007FFEE85D5000-memory.dmp

    Filesize

    8KB

  • memory/4936-1-0x0000026F1ACD0000-0x0000026F1ACE8000-memory.dmp

    Filesize

    96KB

  • memory/4936-2-0x0000026F35390000-0x0000026F35552000-memory.dmp

    Filesize

    1.8MB

  • memory/4936-3-0x00007FFEE85D0000-0x00007FFEE9092000-memory.dmp

    Filesize

    10.8MB

  • memory/4936-4-0x0000026F35B90000-0x0000026F360B8000-memory.dmp

    Filesize

    5.2MB

  • memory/4936-5-0x00007FFEE85D3000-0x00007FFEE85D5000-memory.dmp

    Filesize

    8KB

  • memory/4936-6-0x00007FFEE85D0000-0x00007FFEE9092000-memory.dmp

    Filesize

    10.8MB