Analysis
-
max time kernel
887s -
max time network
888s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-02-2025 08:09
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20241007-en
windows11-21h2-x64
5 signatures
900 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
c5fe943c63dffbd58b0f61b70ce570e3
-
SHA1
1e0385df0eeb6078a04607866cdd0adf47646521
-
SHA256
3fcfc7ed8a9fe616540b4e12926021b8ee515879f555a1e697961483bccb4fa5
-
SHA512
b961ccb840443f5eb78fefa5417e22796f6e0b7272788b8fcdc6abd57262a1c2b4357050171a70af2b0e5d30a1849b081020f3498ab07e50aacbf9f60c32114b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+RPIC:5Zv5PDwbjNrmAE+BIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMzNDg2ODQ0OTQ4MjI0ODI1NA.GmvrOG.IWZ9BB6ZJ0i5ytcVVC-P4pzKCiMdbTruowhj90
-
server_id
1335159502953254943
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 4 discord.com 6 discord.com 8 discord.com 9 discord.com 11 discord.com 12 discord.com 13 discord.com 3 discord.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2C5A.tmp.png" Client-built.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4308 Client-built.exe