Analysis
-
max time kernel
55s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 01:30
Behavioral task
behavioral1
Sample
matcha (cracked version).exe
Resource
win10v2004-20241007-en
4 signatures
150 seconds
General
-
Target
matcha (cracked version).exe
-
Size
78KB
-
MD5
d10c0cba07a9045f70eeb19a6bc2f703
-
SHA1
a2a9c919adb704df40a4c3639c7d096100d72a7b
-
SHA256
d8c209995de6183ed8a8b8d1b9c00dd579d9be234e53ee4434594b61316303fe
-
SHA512
172a0b233b5078cc65beaf369c18d24dca11241a6b6d345d343e1ed7165f34cc30be103a159294a288507ee88f46de3e6f0e2b194ede51d17612d536a31c3a9c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+YPIC:5Zv5PDwbjNrmAE+8IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMyODc5Mzk3MDI4NDk1MzY0MA.GhqsV4.13mA2LtQ6a7mV61HJRU_YgCDDtklHY36T8nFoM
-
server_id
1328793805209731173
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 discord.com 8 discord.com 12 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3292 matcha (cracked version).exe