Analysis
-
max time kernel
93s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 02:10
Behavioral task
behavioral1
Sample
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
Resource
win10v2004-20241007-en
General
-
Target
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe
-
Size
78KB
-
MD5
752a8a79fc7bd174f7cd40ef34add0bb
-
SHA1
cfc8bd68bf9aedd75d78a22ac500e0282ce1836f
-
SHA256
b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca
-
SHA512
edf4acdb289b21290959e8bddd0dbdcd59d73b5b18bffef2a124e4951e790473b5dc94a0db658d6f21646796ff7dcb863b662a20a6be36dd07ad889e117cc317
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+IPICR:5Zv5PDwbjNrmAE+MICR
Malware Config
Extracted
discordrat
-
discord_token
MTMyNDM1NTExMTc0ODc2Nzc4NA.G2CKF3.y_8019btFtzzpOR0WXT_5nKv34bTD7w3OFJDgE
-
server_id
1324357325623918592
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 13 discord.com 14 discord.com 19 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1500 b59b4ff95f3a48024c6926d893c9ff83f0cc5a3cb09e65d4dc1e66ed198fb1ca.exe