Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 04:14

General

  • Target

    built.sfx.exe

  • Size

    550KB

  • MD5

    9f845faa8d20bca0ad5b562c49984226

  • SHA1

    5d9b152c9687f8f8e6359e5f9b3da34dc4ae1448

  • SHA256

    0fc69c69c41de8a3a9b20b7387ebda3cd6948d25da1755c20404fdefdda53555

  • SHA512

    eabcbf804b7090ad2a31af90e6072bbe86bc2d9870306dae2c4262b3588f042d4248591cc665d5167626403a5f6ced92dde7161e933aaecea08bc3b8323a3adb

  • SSDEEP

    12288:NenOND3GsvSAQoReDhwAZbmajZk/f7SGqlJ6P:gnOlW8SnXFwAtmajGOGqiP

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzNjE1MzM2MTU3MzIxNjM0Ng.G2Ga3O.6fY2Q_xGRBTkZD6yro26PYZ_j0hEJCFaIweb3k

  • server_id

    1335778556487139340

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\built.sfx.exe
    "C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2224 -s 596
        3⤵
        • Loads dropped DLL
        PID:2464

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

    Filesize

    78KB

    MD5

    6c0864d8ca1b0cf25ab4545840a9e339

    SHA1

    dea1ab83bc0df17e21c88f24b32fd6b0a9ce5875

    SHA256

    4091dd7fc28d7052fb2ca8c281d892a58ea4205216932ec743c3558f5ece7ef7

    SHA512

    75fab26a7b118bc2ded2d50edb521ffe28713d8b1284f59809244b40bf983727ab122c42dfdaf98c5592527f8ac6039c59d910afa2468e0024e978bbce18b783

  • memory/1988-2-0x0000000003150000-0x0000000003151000-memory.dmp

    Filesize

    4KB

  • memory/1988-17-0x0000000003150000-0x0000000003151000-memory.dmp

    Filesize

    4KB

  • memory/2224-9-0x000007FEF5E13000-0x000007FEF5E14000-memory.dmp

    Filesize

    4KB

  • memory/2224-10-0x000000013FFA0000-0x000000013FFB8000-memory.dmp

    Filesize

    96KB

  • memory/2224-15-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2224-18-0x000007FEF5E10000-0x000007FEF67FC000-memory.dmp

    Filesize

    9.9MB