Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-08-2021 08:36
Behavioral task
behavioral1
Sample
66051b5b99155147ef07daa0ca713759.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
66051b5b99155147ef07daa0ca713759.exe
-
Size
48KB
-
MD5
66051b5b99155147ef07daa0ca713759
-
SHA1
5784b09fe9086374b6b7fb234c731b38fc97dbde
-
SHA256
84cde5b3cca04584373101e1cb4a4f991e6ffcc3463be77bad7c08b03b2f828f
-
SHA512
7e73f922dda954b39e8127f5d8dd43d2a8fc6e275db6d63eef5a3e6b19ac48c1be2d5bac44883c308379f053739f41c4bf4c40f2af7f4d5e2b9215f9dda5c576
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
6.tcp.ngrok.io:10843
Mutex
DcRatMutex_qwqdanchun
Attributes
-
anti_vm
false
-
bsod
false
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
null
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/804-116-0x0000000001050000-0x0000000001060000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
66051b5b99155147ef07daa0ca713759.exedescription pid Process Token: SeDebugPrivilege 804 66051b5b99155147ef07daa0ca713759.exe