Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-02-2025 07:22
Behavioral task
behavioral1
Sample
d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe
Resource
win10v2004-20250217-en
General
-
Target
d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe
-
Size
78KB
-
MD5
11fc8fd9abe3d177bf97cc3021c9c70f
-
SHA1
126706c0ef6087941fa3f6060d9a9ac87ff3a69e
-
SHA256
d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941
-
SHA512
56f0126608630f3bcf8ef3693d6caa41fb85b71fe7be0ba23fd8e88839b253d1cf5ffb699bc1e7b6987fa9d126f96e8034109558a1e466913abc0f054c5422ce
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+kPIC:5Zv5PDwbjNrmAE+4IC
Malware Config
Extracted
discordrat
-
discord_token
MTM0MTUxOTI2Mzg4NTgyNDA3Mw.GIMjzQ.3ahVrwPiBDUOavG7cggk_eoN4_TXLFf-saRC04
-
server_id
1341518669251088486
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 308 wrote to memory of 2508 308 d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe 30 PID 308 wrote to memory of 2508 308 d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe 30 PID 308 wrote to memory of 2508 308 d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe"C:\Users\Admin\AppData\Local\Temp\d8c89492ce546f9f8c93f32d8f588f24430ed1474cf94c829a357d6831134941.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 308 -s 5962⤵PID:2508
-