Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
07-02-2025 04:14
Static task
static1
Behavioral task
behavioral1
Sample
built.sfx.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
built.sfx.exe
Resource
win10v2004-20250129-en
General
-
Target
built.sfx.exe
-
Size
550KB
-
MD5
9f845faa8d20bca0ad5b562c49984226
-
SHA1
5d9b152c9687f8f8e6359e5f9b3da34dc4ae1448
-
SHA256
0fc69c69c41de8a3a9b20b7387ebda3cd6948d25da1755c20404fdefdda53555
-
SHA512
eabcbf804b7090ad2a31af90e6072bbe86bc2d9870306dae2c4262b3588f042d4248591cc665d5167626403a5f6ced92dde7161e933aaecea08bc3b8323a3adb
-
SSDEEP
12288:NenOND3GsvSAQoReDhwAZbmajZk/f7SGqlJ6P:gnOlW8SnXFwAtmajGOGqiP
Malware Config
Extracted
discordrat
-
discord_token
MTMzNjE1MzM2MTU3MzIxNjM0Ng.G2Ga3O.6fY2Q_xGRBTkZD6yro26PYZ_j0hEJCFaIweb3k
-
server_id
1335778556487139340
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-70482961-775596374-3727440602-1000\Control Panel\International\Geo\Nation built.sfx.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 Client-built.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1612 Client-built.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1612 1244 built.sfx.exe 95 PID 1244 wrote to memory of 1612 1244 built.sfx.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD56c0864d8ca1b0cf25ab4545840a9e339
SHA1dea1ab83bc0df17e21c88f24b32fd6b0a9ce5875
SHA2564091dd7fc28d7052fb2ca8c281d892a58ea4205216932ec743c3558f5ece7ef7
SHA51275fab26a7b118bc2ded2d50edb521ffe28713d8b1284f59809244b40bf983727ab122c42dfdaf98c5592527f8ac6039c59d910afa2468e0024e978bbce18b783