Analysis

  • max time kernel
    887s
  • max time network
    888s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    01-02-2025 08:09

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    c5fe943c63dffbd58b0f61b70ce570e3

  • SHA1

    1e0385df0eeb6078a04607866cdd0adf47646521

  • SHA256

    3fcfc7ed8a9fe616540b4e12926021b8ee515879f555a1e697961483bccb4fa5

  • SHA512

    b961ccb840443f5eb78fefa5417e22796f6e0b7272788b8fcdc6abd57262a1c2b4357050171a70af2b0e5d30a1849b081020f3498ab07e50aacbf9f60c32114b

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+RPIC:5Zv5PDwbjNrmAE+BIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzNDg2ODQ0OTQ4MjI0ODI1NA.GmvrOG.IWZ9BB6ZJ0i5ytcVVC-P4pzKCiMdbTruowhj90

  • server_id

    1335159502953254943

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4308-0-0x00007FF8C0A13000-0x00007FF8C0A15000-memory.dmp

    Filesize

    8KB

  • memory/4308-1-0x00000291A25F0000-0x00000291A2608000-memory.dmp

    Filesize

    96KB

  • memory/4308-2-0x00000291BCC40000-0x00000291BCE02000-memory.dmp

    Filesize

    1.8MB

  • memory/4308-3-0x00007FF8C0A10000-0x00007FF8C14D2000-memory.dmp

    Filesize

    10.8MB

  • memory/4308-4-0x00000291BDEC0000-0x00000291BE3E8000-memory.dmp

    Filesize

    5.2MB

  • memory/4308-5-0x00007FF8C0A13000-0x00007FF8C0A15000-memory.dmp

    Filesize

    8KB

  • memory/4308-6-0x00007FF8C0A10000-0x00007FF8C14D2000-memory.dmp

    Filesize

    10.8MB

  • memory/4308-10-0x00007FF8C0A10000-0x00007FF8C14D2000-memory.dmp

    Filesize

    10.8MB