Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-02-2025 03:43
Behavioral task
behavioral1
Sample
f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe
Resource
win10v2004-20250217-en
General
-
Target
f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe
-
Size
78KB
-
MD5
0efad9a2c6e07c368132804e88340c42
-
SHA1
c366df6e8196806ede6e0ac84aa29188ea305c6d
-
SHA256
f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f
-
SHA512
afe502a6149107d302fa201ec92d7e9242c327df4edd2a9e96cfdd0ee55357cb94fc38a1999c7d64a4b426014009a5d867302c40c57b46e24864d68fdf22b4a2
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+TPIC:5Zv5PDwbjNrmAE+LIC
Malware Config
Extracted
discordrat
-
discord_token
MTMzNzg4MTk1NTcxODM5ODEyMw.GWcWoZ.AKDycrZcJAUwCgc6wNgGDl6uArWviuy5Ka_U4o
-
server_id
1331299901140635709
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2580 wrote to memory of 3044 2580 f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe 31 PID 2580 wrote to memory of 3044 2580 f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe 31 PID 2580 wrote to memory of 3044 2580 f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe"C:\Users\Admin\AppData\Local\Temp\f19b406e68a9299475e8437f9747988e2f9b800ebe390aaea47101ef47ff083f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 6002⤵PID:3044
-