Analysis
-
max time kernel
15s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27-12-2024 19:52
Behavioral task
behavioral1
Sample
15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe
Resource
win10v2004-20241007-en
General
-
Target
15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe
-
Size
78KB
-
MD5
41c8101b8f008edc7ae2ece242e80a80
-
SHA1
07800dc227a82785211fdf5ab38a96bf5dca4bc0
-
SHA256
15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c
-
SHA512
f024178ea1a2a441da8833919305008b091fccfd5539ec488308d2355f0f3c6c5e27644398c292da4b1f436ce8aa24af1ff932cb2df3bccb2fc7fc3cdb1729c0
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+0PIC:5Zv5PDwbjNrmAE+oIC
Malware Config
Extracted
discordrat
-
discord_token
MTMyMDIyNzY0ODA4MDg0MjgyMg.Gg4NVw.0BAcQe9Au5XfQ1tAdPLOqCxl_Hublqa4e8JxBk
-
server_id
1320185318841778279
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 1272 2528 15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe 30 PID 2528 wrote to memory of 1272 2528 15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe 30 PID 2528 wrote to memory of 1272 2528 15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe"C:\Users\Admin\AppData\Local\Temp\15a7d3d3911009e4463b669177344eba876578bc78c0f61f27d1c83b63a1a84c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2528 -s 5962⤵PID:1272
-