Analysis

  • max time kernel
    136s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-02-2025 04:14

General

  • Target

    built.sfx.exe

  • Size

    550KB

  • MD5

    9f845faa8d20bca0ad5b562c49984226

  • SHA1

    5d9b152c9687f8f8e6359e5f9b3da34dc4ae1448

  • SHA256

    0fc69c69c41de8a3a9b20b7387ebda3cd6948d25da1755c20404fdefdda53555

  • SHA512

    eabcbf804b7090ad2a31af90e6072bbe86bc2d9870306dae2c4262b3588f042d4248591cc665d5167626403a5f6ced92dde7161e933aaecea08bc3b8323a3adb

  • SSDEEP

    12288:NenOND3GsvSAQoReDhwAZbmajZk/f7SGqlJ6P:gnOlW8SnXFwAtmajGOGqiP

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMzNjE1MzM2MTU3MzIxNjM0Ng.G2Ga3O.6fY2Q_xGRBTkZD6yro26PYZ_j0hEJCFaIweb3k

  • server_id

    1335778556487139340

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\built.sfx.exe
    "C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

    Filesize

    78KB

    MD5

    6c0864d8ca1b0cf25ab4545840a9e339

    SHA1

    dea1ab83bc0df17e21c88f24b32fd6b0a9ce5875

    SHA256

    4091dd7fc28d7052fb2ca8c281d892a58ea4205216932ec743c3558f5ece7ef7

    SHA512

    75fab26a7b118bc2ded2d50edb521ffe28713d8b1284f59809244b40bf983727ab122c42dfdaf98c5592527f8ac6039c59d910afa2468e0024e978bbce18b783

  • memory/1612-12-0x00007FFAB2743000-0x00007FFAB2745000-memory.dmp

    Filesize

    8KB

  • memory/1612-13-0x000001FD75D30000-0x000001FD75D48000-memory.dmp

    Filesize

    96KB

  • memory/1612-14-0x000001FD78470000-0x000001FD78632000-memory.dmp

    Filesize

    1.8MB

  • memory/1612-15-0x00007FFAB2740000-0x00007FFAB3201000-memory.dmp

    Filesize

    10.8MB

  • memory/1612-16-0x000001FD78CB0000-0x000001FD791D8000-memory.dmp

    Filesize

    5.2MB

  • memory/1612-17-0x00007FFAB2743000-0x00007FFAB2745000-memory.dmp

    Filesize

    8KB

  • memory/1612-18-0x00007FFAB2740000-0x00007FFAB3201000-memory.dmp

    Filesize

    10.8MB