Resubmissions
27-01-2025 18:33
250127-w7cybs1pel 1027-01-2025 18:32
250127-w6335a1kev 1027-01-2025 18:31
250127-w6gj5a1pbq 10Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 18:31
Behavioral task
behavioral1
Sample
Nixware Loader.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
READ ME.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
Nixware Loader.exe
-
Size
78KB
-
MD5
0c3707365415a5dde7293f2109fe0b4e
-
SHA1
10e64f1087f142bb2e3301d41f5b600933291099
-
SHA256
0adc04c287413eac1f39fe5abeaed5655c3b74f3ee346646ee2d71fec944f1ac
-
SHA512
e9b914a6f9b8e434f240ae96072f4bca963bb64e63abcab76a1ecb626bac6cbe6ca79c6eb06872f83a740f7a1ce3eeb6fe44c56e07ba9e7393a1b97581698e90
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+cPIC:5Zv5PDwbjNrmAE+QIC
Malware Config
Extracted
discordrat
-
discord_token
MTAyMTQzMjA3ODQzMDExMzc5Mw.GRS-So.q-fGy4OeZA7_se-xUdFVkaPiNxQJFRukyw9Ofw
-
server_id
1321113521538203738
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file 2 IoCs
flow pid Process 36 2788 Nixware Loader.exe 53 2788 Nixware Loader.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 54 discord.com 17 discord.com 37 discord.com 39 discord.com 36 raw.githubusercontent.com 53 raw.githubusercontent.com 55 discord.com 12 discord.com 20 discord.com 35 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2788 Nixware Loader.exe