Analysis
-
max time kernel
104s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe
Resource
win10v2004-20250314-en
General
-
Target
6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe
-
Size
670KB
-
MD5
7678662a2d17213e9702b32849b93f50
-
SHA1
0103985b35e19cd62391f78dad39a906cbc29fa6
-
SHA256
6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0
-
SHA512
7f3968449b87786228e5a9e3c593fe1a5a17aefb07a37c29cdc854e74c595f4435c753ad3e12b80e9f1f8e0a6db525c2d304ae3db67ee41034be1effd7acf8b2
-
SSDEEP
12288:lbQIi8rXTWcJHsp63L2tf6l3k6UDTaBCDWvrZE3Jj:lbQfQjWKM072B6l3k6iTaBCDWvri5j
Malware Config
Extracted
discordrat
-
discord_token
MTM2MDk2NTQ2OTQzMTAwOTUxMA.GgBXT5.BBz5TSgCaJBkVoYheyBUpT5_ov8AioGtg7qzdc
-
server_id
1360965855982260224
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation 6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe -
Executes dropped EXE 1 IoCs
pid Process 3584 backdoor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 37 discord.com 38 discord.com 41 discord.com 61 discord.com 68 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3584 backdoor.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3584 3572 6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe 98 PID 3572 wrote to memory of 3584 3572 6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe"C:\Users\Admin\AppData\Local\Temp\6b436dc3ef858aba1d333ff383e6f988eff27f135fd7a18c05ee8638d3d333c0.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3584
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5006414f6a79c94e311875a7554c07f0e
SHA1480eeadd6a104dcb0661933a38d2f1c309ab8b90
SHA256e84d23972b9e1609023b14758faff97ff7d750984e1653487dd1e3c458d181bf
SHA5124363087ca12796f66228f14759d67cc9344362d0b74472e3a97642123bb8c591b95feb8e47b29c06c72e515d2c3a6062cea548e7c04fc79d81997bd294cbecb6