Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 02:10
Behavioral task
behavioral1
Sample
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
Resource
win10v2004-20241007-en
General
-
Target
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
-
Size
78KB
-
MD5
752a8a79fc7bd174f7cd40ef34add0bb
-
SHA1
cfc8bd68bf9aedd75d78a22ac500e0282ce1836f
-
SHA256
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca
-
SHA512
edf4acdb289b21290959e8bddd0dbdcd59d73b5b18bffef2a124e4951e790473b5dc94a0db658d6f21646796ff7dcb863b662a20a6be36dd07ad889e117cc317
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+IPICR:5Zv5PDwbjNrmAE+MICR
Malware Config
Extracted
discordrat
-
discord_token
MTMyNDM1NTExMTc0ODc2Nzc4NA.G2CKF3.y_8019btFtzzpOR0WXT_5nKv34bTD7w3OFJDgE
-
server_id
1324357325623918592
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2548 2092 b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe 30 PID 2092 wrote to memory of 2548 2092 b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe 30 PID 2092 wrote to memory of 2548 2092 b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe"C:\Users\Admin\AppData\Local\Temp\b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2092 -s 5962⤵PID:2548
-