Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
Lorito.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Lorito.exe
Resource
win10v2004-20241007-en
General
-
Target
Lorito.exe
-
Size
506KB
-
MD5
5145238a5fe1dedf3a95a6727f46d87d
-
SHA1
f89ff2e64a37fbacb8bcde27b1433f74ecb62a05
-
SHA256
feeaaf0a4f055a7f5c5cc3ec02689d23155bbefa8d473f6f29bbc453753350da
-
SHA512
ca5c1f2d9484f5df193b6de47ca1157949d0700175e25016d2c602ef7cd68381141383c3abec280d015f44409efca3425ec3fd39cf8f2ea7f1135439d71fb6f3
-
SSDEEP
6144:Cqj9Vbvt0CVAtM9ST08l4oqHU4KpF0gQoIsRHZ/QTGoDMyD5cDfXowzr+pldTuse:Nn0LIyy/LMIsHZo6gM2WX4pvTuJOOJ
Malware Config
Extracted
discordrat
-
discord_token
MTMxODIyMjc3NTA0MjgzODUzOQ.GlP3Ne.ymlpBd4lypP98gk2QafDxsxkAzy26pPCyBZ7Xg
-
server_id
1318223874348941362
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2580 Backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2340 Lorito.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2580 2340 Lorito.exe 31 PID 2340 wrote to memory of 2580 2340 Lorito.exe 31 PID 2340 wrote to memory of 2580 2340 Lorito.exe 31 PID 2580 wrote to memory of 2552 2580 Backdoor.exe 32 PID 2580 wrote to memory of 2552 2580 Backdoor.exe 32 PID 2580 wrote to memory of 2552 2580 Backdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lorito.exe"C:\Users\Admin\AppData\Local\Temp\Lorito.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 5963⤵
- Loads dropped DLL
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5ce711361fc917b5fc43ae31105c6ef0f
SHA1bdc3c38d0843ccdb19de071b2dc2739a93ce9def
SHA2567056dae1e807cdd837454a982235a33292e0b8ad96d211aa6e1ae82ef15e87ac
SHA5126e6395ebc6578eaef02efe1d925d6ea48809b571ae72051d25405cefb1483801932b86dfdfb66607dacdc58e6992a9bde1061ceab1a8d7cfb430c66ae75fd3c2