Analysis
-
max time kernel
105s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250313-en -
resource tags
arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 14:50
Behavioral task
behavioral1
Sample
fa239f911c797de3fdeaded9491f08ca588636832ba80f085df05a4c97e22f9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa239f911c797de3fdeaded9491f08ca588636832ba80f085df05a4c97e22f9f.exe
Resource
win10v2004-20250313-en
General
-
Target
fa239f911c797de3fdeaded9491f08ca588636832ba80f085df05a4c97e22f9f.exe
-
Size
78KB
-
MD5
b10abf9b6390fe11e89d03e5c6dbaa7e
-
SHA1
2a6f13197be89720f33c2d472293615b0e48291f
-
SHA256
fa239f911c797de3fdeaded9491f08ca588636832ba80f085df05a4c97e22f9f
-
SHA512
98228a98a1ea4cc356134f4c2d798496c75bb651899952d071fd93727623c7fdfecc08ae7d0b65080f1ee37cc583df62377cc3013bfe149f5839f9d96bb2b6d1
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V++2PIC:5Zv5PDwbjNrmAE+fIC
Malware Config
Extracted
discordrat
-
discord_token
MTMyOTQyNDU0NjIwNTQwMTEzMQ.G4EXOv.6WySxkjIZh-p9471_ND5hKzMOnE93xyDg4cyE8
-
server_id
1329425534127443999
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 26 discord.com 27 discord.com 32 discord.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 fa239f911c797de3fdeaded9491f08ca588636832ba80f085df05a4c97e22f9f.exe