Analysis
-
max time kernel
96s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 13:29
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Bootstrapper.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Bootstrapper.exe
-
Size
78KB
-
MD5
002260e88f41f37e23cd07a7c17fb4c7
-
SHA1
eeaa37f667f876970941009cbc02cfe350b0ff49
-
SHA256
daa9a722b82d251a4db096f7ec24308b21f8e1e357233d67268ed09b6d9ca6ab
-
SHA512
f964f68913c611e63903dedf213c1f983948f5eb548faaa3549c8353db116bc5952c23a56b39cd718746d7f6a8b59792e16cd9cc68fc767f8a961ba76e7f6718
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+4PIC:5Zv5PDwbjNrmAE+cIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMyNTA4NjM1OTY5MzU1Nzg2MA.Gy12zF.Ez60W13rQoYrcb7hHtY3BMQfSniXY4txdPYX7I
-
server_id
1325061927801458719
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 discord.com 10 discord.com 14 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3200 Bootstrapper.exe