Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 14:56
Behavioral task
behavioral1
Sample
24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe
-
Size
78KB
-
MD5
2c7ac73364ad25578980104025295540
-
SHA1
dd1da4ab87ff625463ab545434ac6fa877030719
-
SHA256
24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fc
-
SHA512
f5bb5bf9997af04eabc51f9e7d7d9256c7b608bf4c9a5da6448696e7d8a7baf4ca6b880f6bea148f1c526ae36a9ef842f9b65af8fe9e2142dbffe9ad665bb92c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+cPIC:5Zv5PDwbjNrmAE+QIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzUyOTIxNDUyNTkwMjg4OA.GE8ssf.2_WCL-cVSbV4bX1grjkr1uccsbhdkDGvWCWA3o
-
server_id
1320148591603351694
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2136 1016 24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe 30 PID 1016 wrote to memory of 2136 1016 24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe 30 PID 1016 wrote to memory of 2136 1016 24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe"C:\Users\Admin\AppData\Local\Temp\24fb642e355bcaad236e40dc7ed7b4a50b80470e77590e68c4820f2f842426fcN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1016 -s 5962⤵PID:2136
-