Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 21:48
Behavioral task
behavioral1
Sample
Crackpermspoofer.exe
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
Crackpermspoofer.exe
Resource
win10v2004-20250217-en
3 signatures
150 seconds
General
-
Target
Crackpermspoofer.exe
-
Size
78KB
-
MD5
63ec2a8c348d255586762d693ddf98db
-
SHA1
b04dda431d28d76e205b528f74d10ffa69f3a960
-
SHA256
013fa3b832efcc8647331576e6f512b4101eb087d6155bbfc976d680e668a667
-
SHA512
e1f5f717770212241243f5cc166f7b89f6f89c0cdf2f442b56b8b5738e820a79a513fb9733a78451908c717961273acebc314a99f198cded5b425e878b4fbc88
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+OPIC:5Zv5PDwbjNrmAE+qIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMzNDYyNTQ5ODUxMjQ5NDYzNA.G0EGQj.I75TlNTsSnE4gYOgbUK9YInJj34V1hRalj4piM
-
server_id
1185260625232937030
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2384 2016 Crackpermspoofer.exe 30 PID 2016 wrote to memory of 2384 2016 Crackpermspoofer.exe 30 PID 2016 wrote to memory of 2384 2016 Crackpermspoofer.exe 30