Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2025, 21:04
Behavioral task
behavioral1
Sample
Roblox executor.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
Roblox executor.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
boostrapper.vbs
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
boostrapper.vbs
Resource
win11-20250410-en
General
-
Target
Roblox executor.exe
-
Size
78KB
-
MD5
d4492c91b127b304f924edabe3213cec
-
SHA1
33569c0c910c1738873bea8cdb2652aa4335ac43
-
SHA256
f975182341f7800acdb358b504cf753c9bb54d9055b22e7a423ce04a7e583a98
-
SHA512
b25d18814f69098d70a9d6532f41b2e108821281aff4466a2b9e1bab533a13dd21a3cb168688a905425c19cfe5d3994d5bc14d6c7345ddb53c8c9ab7496948c2
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Malware Config
Extracted
discordrat
-
discord_token
MTM2MjQ4NDQ3NDg1OTc1MzU3Mg.G6F0XN.VLF6L9woFXrcJqvnK2pSc21C4w5iXBv79eVBjs
-
server_id
1362170836378845274
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3152 Roblox executor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Roblox executor.exe"C:\Users\Admin\AppData\Local\Temp\Roblox executor.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3152
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5176