Analysis
-
max time kernel
56s -
max time network
57s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 21:02
Behavioral task
behavioral1
Sample
Matrix.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Matrix.exe
Resource
win10v2004-20250129-en
Errors
General
-
Target
Matrix.exe
-
Size
78KB
-
MD5
f0a4ffc67ffbf866318bea08b4cdd538
-
SHA1
acc1205445cbf5a30e3c8218496c997390402259
-
SHA256
5c9d5f658db975741b3b76a10406698698a61f60ee92b52ef98385883eaddb2f
-
SHA512
46601af1adf87742d6f78859db4d68eed7baaf8ab4bb97c3644d0bde268f71b48ba6a66ef84e42d006872c2b7bafea48cbcf3eda0be59dc9be582d81a55e604d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WPIC:5Zv5PDwbjNrmAE+SIC
Malware Config
Extracted
discordrat
-
discord_token
MTMyODY4Mjg2MjE3NzgxMjUwMg.GR7HEc.IEXnW7zdY83UmfxBEmYrn5HmOX_a4Z_5qwBR-c
-
server_id
1328680912891940864
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 25 3440 Matrix.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 45 discord.com 3 discord.com 4 discord.com 44 discord.com 26 discord.com 27 discord.com 18 discord.com 24 raw.githubusercontent.com 25 raw.githubusercontent.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3440 Matrix.exe Token: SeShutdownPrivilege 3440 Matrix.exe