Analysis
-
max time kernel
20s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 20:23
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20250217-en
4 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
a94ec2e3f8ffa8756927542c5e2a1ad0
-
SHA1
3548d5beb68a640581b12d946d46f9fee864dae4
-
SHA256
6c8f2d4a91ce023f5d1002e21d93fed64e937493c642ab4e0abafd259dbeadcb
-
SHA512
e95d71d760f7782cd21f8a56add9b0be35aaf278fb3d61a70f60aa2eccdaf465b03a9e79dc357ad90a4926a5ec17af76e9a8310047cf041c5c8b725b8c07edd3
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTM0MzY3OTE5NzI2NDIyMDE5MA.G9VWM5.4_kCc6hg_UXHL89zUn7TjcKfSCZtFreZIlK17c
-
server_id
1343668560513339465
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 18 discord.com 20 discord.com 27 discord.com 35 discord.com 36 discord.com -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4748 Client-built.exe Token: SeShutdownPrivilege 4748 Client-built.exe