Resubmissions

31/03/2025, 15:21

250331-srce3svnz4 10

31/03/2025, 15:02

250331-sesarsste1 10

Analysis

  • max time kernel
    103s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2025, 15:21

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    7943c195a125d0684b7f139d22485d30

  • SHA1

    d8e99c1d9c3fc1b3d54932510e8c15ef35326610

  • SHA256

    88d0b715a36832b0e69d30b180dd927800969ab1f0e3b21e584cd8033373dcca

  • SHA512

    1c563a84162fed409ed9dcd5c76c031ebf03ed0309f554ff7662421412ea213d310dd01fa5e8dfa4256bfe71ca5406d759446006cb13c36b84c974d0b48befff

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+UPIC:5Zv5PDwbjNrmAE+IIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTM1NjI4MTg2NTE3ODMxNjgyMA.GeoxaT.ocqOcSIpXr6UreUuaB7hoXHmcnhfEknTw6-SuE

  • server_id

    1356279473779245056

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    C:\Users\Admin\AppData\Local\Temp\Client-built.exe bcdedit /c set shutdown /r readonly /f force /t 2
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:720

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/720-0-0x00007FFEDE663000-0x00007FFEDE665000-memory.dmp

    Filesize

    8KB

  • memory/720-1-0x000001E231F00000-0x000001E231F18000-memory.dmp

    Filesize

    96KB

  • memory/720-2-0x000001E24C5F0000-0x000001E24C7B2000-memory.dmp

    Filesize

    1.8MB

  • memory/720-3-0x00007FFEDE660000-0x00007FFEDF121000-memory.dmp

    Filesize

    10.8MB

  • memory/720-4-0x000001E24CCF0000-0x000001E24D218000-memory.dmp

    Filesize

    5.2MB

  • memory/720-5-0x00007FFEDE663000-0x00007FFEDE665000-memory.dmp

    Filesize

    8KB

  • memory/720-6-0x00007FFEDE660000-0x00007FFEDF121000-memory.dmp

    Filesize

    10.8MB