Analysis
-
max time kernel
1s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 19:06
Behavioral task
behavioral1
Sample
TEST.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
TEST.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
TEST.exe
-
Size
78KB
-
MD5
d342164488b5574da639e404c0756831
-
SHA1
1896ec0095610935993935b1fa14678d729e3d12
-
SHA256
0a5829c5c2d1ffb068abcffc0a6f808438a52cbb7e974445d08770428b96c7b7
-
SHA512
0b9b76906bf6ec4e2868d3412df69ee77bef132ff2396c2cf802c44e909c53635bfccdfd23fae3b55560f4e83edacec529311f94901e6c23654e4f8bb8e62590
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+yPIC:5Zv5PDwbjNrmAE++IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMzMjQwOTA2MzQ5NzAwNzIwNA.G_n8fU.DfbgmS7-yP4cbSNse2dBgOV4sXge7EKO5X8MBo
-
server_id
1332408693144420362
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2096 2100 TEST.exe 30 PID 2100 wrote to memory of 2096 2100 TEST.exe 30 PID 2100 wrote to memory of 2096 2100 TEST.exe 30