Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-01-2025 17:22
Behavioral task
behavioral1
Sample
loader.exe
Resource
win11-20241007-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
loader.exe
-
Size
78KB
-
MD5
11642158e2aa02763cf233d531c4badd
-
SHA1
581f6898a7dcbe74aa6ed63d3ce88ddb36121863
-
SHA256
9b82456b1d66cb18ae687d200946b24af4c728d27a45ac58faa7984db7c8f62d
-
SHA512
e27c7bdd9d83285dba1dfacce6edc405f5de9cc38480fe08fedda2eb212b6bffec520da7282e644e1bbfda7dd8493cc9e8ca63e57df50f747605eb3d28831fc8
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMxNzUyOTIxNDUyNTkwMjg4OA.Gl00Su.kwu9gYGqwYSCMmFg_QT0614c7yX3JSjWhJHwps
-
server_id
1320148591603351694
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 9 discord.com 10 discord.com 1 discord.com 3 discord.com 5 discord.com 6 discord.com 7 discord.com 8 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3752 loader.exe