Analysis
-
max time kernel
149s -
max time network
169s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
28-08-2021 08:36
Behavioral task
behavioral1
Sample
66051b5b99155147ef07daa0ca713759.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
66051b5b99155147ef07daa0ca713759.exe
-
Size
48KB
-
MD5
66051b5b99155147ef07daa0ca713759
-
SHA1
5784b09fe9086374b6b7fb234c731b38fc97dbde
-
SHA256
84cde5b3cca04584373101e1cb4a4f991e6ffcc3463be77bad7c08b03b2f828f
-
SHA512
7e73f922dda954b39e8127f5d8dd43d2a8fc6e275db6d63eef5a3e6b19ac48c1be2d5bac44883c308379f053739f41c4bf4c40f2af7f4d5e2b9215f9dda5c576
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
6.tcp.ngrok.io:10843
Mutex
DcRatMutex_qwqdanchun
Attributes
-
anti_vm
false
-
bsod
false
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2008-62-0x00000000002D0000-0x00000000002E0000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
66051b5b99155147ef07daa0ca713759.exedescription pid Process Token: SeDebugPrivilege 2008 66051b5b99155147ef07daa0ca713759.exe