Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2025 17:13

General

  • Target

    Client-built1.exe

  • Size

    78KB

  • MD5

    c305efabf3779d300d766a4e2990f6cd

  • SHA1

    febf6b16a6e3de42427fc0fbc2a1191acc66aaa8

  • SHA256

    9c538454c0d5bc061140f31eb10784e7f525f865dcdaa4b66aa689c1a85543b8

  • SHA512

    05653e94292a2aa95203857b6efb0cfe4d9562a6f94c8dce6d12063ad4e39021abc42fe5058b15a2906715b232388dca6e272f3336e915c70ded964454a850cc

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwODUzODYxNDg0MTM0NDAyMQ.GYcOVt.Gp_DOcHBox7P0N-zNBTm49eq6NTvt_N2AxMvF8

  • server_id

    1336013454258995351

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built1.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4632

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4632-0-0x00007FF81BFF3000-0x00007FF81BFF5000-memory.dmp

    Filesize

    8KB

  • memory/4632-1-0x000001BB5CF70000-0x000001BB5CF88000-memory.dmp

    Filesize

    96KB

  • memory/4632-2-0x000001BB77560000-0x000001BB77722000-memory.dmp

    Filesize

    1.8MB

  • memory/4632-3-0x00007FF81BFF0000-0x00007FF81CAB1000-memory.dmp

    Filesize

    10.8MB

  • memory/4632-4-0x000001BB77E60000-0x000001BB78388000-memory.dmp

    Filesize

    5.2MB

  • memory/4632-5-0x00007FF81BFF3000-0x00007FF81BFF5000-memory.dmp

    Filesize

    8KB

  • memory/4632-6-0x00007FF81BFF0000-0x00007FF81CAB1000-memory.dmp

    Filesize

    10.8MB