Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 18:11
Behavioral task
behavioral1
Sample
f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe
Resource
win10v2004-20250313-en
General
-
Target
f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe
-
Size
78KB
-
MD5
61ab5f0d4c935e070453793da932f876
-
SHA1
5743ae16fdd28ded14d4c6efc9967d520043efb6
-
SHA256
f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63
-
SHA512
818e77611632533b298e07aec26195901aafa0b08a84a1b6ef5199496da1829441373a8d347eafa9d05eef85733a075ad80ad814a339de957f00ee580592b34f
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+dPIC:5Zv5PDwbjNrmAE+NIC
Malware Config
Extracted
discordrat
-
discord_token
MTM1Mzk0OTU5MjgwNjQ5MDE4Mw.Ge6xlM.230RZkdbvNS3PW679kyNkZMoIB0mnjgZpxNYsM
-
server_id
1353947596262998036
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2780 2864 f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe 30 PID 2864 wrote to memory of 2780 2864 f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe 30 PID 2864 wrote to memory of 2780 2864 f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe"C:\Users\Admin\AppData\Local\Temp\f6c156e58b9fa032e28663d474ec9f747524298781a7df5e29a477b45d51bb63.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2864 -s 5962⤵PID:2780
-