Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 05:17
Static task
static1
Behavioral task
behavioral1
Sample
fortnitegpj.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fortnitegpj.exe
Resource
win10v2004-20241007-en
General
-
Target
fortnitegpj.exe
-
Size
872KB
-
MD5
1e2050af9bccc9a8766a43fb83b9b1f0
-
SHA1
d26c33e6c6db918dccbd538877e301b28c90307e
-
SHA256
7c025b2421e49f55f97484db876940a4be40ad66180745bf5cbf27242aa5d433
-
SHA512
cf6c4085b0a260e920cb737c50cdce42fcf684120005072b6f4dd125ad058c142fc51220695d0b2ebc1e4c9e74283f5eb091b709a58e92ba8f0545bba4e116f6
-
SSDEEP
24576:X5ZWs+OZVEWry8AFBn+yHDB17T4ZQqKkFPJ1x1CwrNa6h8kQU17l:JZB1G8Yt+yjT/joFzxr46houl
Malware Config
Extracted
discordrat
-
discord_token
MTE3MDQzNjc1NDU1NDI0NTE4MA.G8c-n6.n5Z1nJRp3yw5c3HWGqwGMY-vuXkB44mjt5C8jE
-
server_id
1298154591732629564
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2772 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 2760 fortnitegpj.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe 2680 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2760 wrote to memory of 2772 2760 fortnitegpj.exe 32 PID 2760 wrote to memory of 2772 2760 fortnitegpj.exe 32 PID 2760 wrote to memory of 2772 2760 fortnitegpj.exe 32 PID 2772 wrote to memory of 2680 2772 Client-built.exe 33 PID 2772 wrote to memory of 2680 2772 Client-built.exe 33 PID 2772 wrote to memory of 2680 2772 Client-built.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnitegpj.exe"C:\Users\Admin\AppData\Local\Temp\fortnitegpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2772 -s 5963⤵
- Loads dropped DLL
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD531da0445e4df48447bf0837e5fd5d17d
SHA1ef352de96cc41e40d2eff276102daf44297c0799
SHA2569e43df1193f7077f7438de824501d1436ca1f126a307a6b7c81bc8d4a90efa2c
SHA512a2b2271062f9fc9e98c5c1ef8ed8a4e53c2a4a3f2428df2b574ddcf0f3312f01610d2f5ae246a2d411212f79954e38028ccf13935f8f0d44e0a0ba336e8ea88f