Analysis
-
max time kernel
35s -
max time network
43s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250207-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250207-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
14-02-2025 19:32
Behavioral task
behavioral1
Sample
Bootstrapper.exe
Resource
win10ltsc2021-20250207-en
3 signatures
60 seconds
General
-
Target
Bootstrapper.exe
-
Size
78KB
-
MD5
0333cbd175b140dbd2e1f40da264c47e
-
SHA1
3d5652f50a57aea4c61942a6857a29556d349b24
-
SHA256
7728affef21fc8c547a2646849a8e462d1217d6e85d4578a23ed71db7b77d467
-
SHA512
60b64f020a9b013ef642576ad29f1caf363b0be7679bc1b64ec70a2d88abfbffd64523c6d84b0be7c739318dd85e3de1f0dec26de14f203c51879b22e3dc4e6b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+GPIC:5Zv5PDwbjNrmAE+iIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTM0MDAzOTE0NDU4NzY2MTQ1OQ.G0CIRd.IdjzlDfdFrEFamtcSN6jYxt5znz8nrXxghsww8
-
server_id
1340039546653380752
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4596 Bootstrapper.exe