Analysis

  • max time kernel
    445s
  • max time network
    447s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-01-2025 22:12

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    c5ee1d96303a9b22a34866beaaa4271d

  • SHA1

    498b95f35137a02bbdf164b87292f657ef505288

  • SHA256

    51a25d85d3e8e51bac4386f319fe4316e54b3457686c63149185d84b100114ae

  • SHA512

    b8661c5ab2efdc60233a6fbc6f7869ac9744068f384808e63460d2bb489e0977472ee2ecffbc853a15955273bea3444271e2859587f3265524ade7c7808f8047

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMyNDExODIwNDM4MTEzNDkwMA.GZSIU7.O-UTajAb4V-HFQMunqlImDEQ-eUIuJjfuVOJKg

  • server_id

    1324136004826697748

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2892

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2892-0-0x00007FFDD1B53000-0x00007FFDD1B55000-memory.dmp

    Filesize

    8KB

  • memory/2892-1-0x0000024C2E070000-0x0000024C2E088000-memory.dmp

    Filesize

    96KB

  • memory/2892-2-0x0000024C48690000-0x0000024C48852000-memory.dmp

    Filesize

    1.8MB

  • memory/2892-3-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB

  • memory/2892-4-0x0000024C49960000-0x0000024C49E88000-memory.dmp

    Filesize

    5.2MB

  • memory/2892-5-0x00007FFDD1B53000-0x00007FFDD1B55000-memory.dmp

    Filesize

    8KB

  • memory/2892-6-0x00007FFDD1B50000-0x00007FFDD2612000-memory.dmp

    Filesize

    10.8MB