Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 12:12
Static task
static1
Behavioral task
behavioral1
Sample
a92393ed590a3d90bf8ec8f1dfa4433f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
a92393ed590a3d90bf8ec8f1dfa4433f.exe
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
a92393ed590a3d90bf8ec8f1dfa4433f.exe
-
Size
149KB
-
MD5
a92393ed590a3d90bf8ec8f1dfa4433f
-
SHA1
f345aa40fe883cf3eee8626d43542e815a4aacf7
-
SHA256
d0fef87fd7e5a7214773deef4c445970147c88d5335867b552f9d4d22ef0231b
-
SHA512
268a682ed1d647c8b5ff8ca3e3b4ad3fdbc99a945726913e4a24295fc02d33cbb3a93e225250ce86d9bde328f9acb18a69671967c2c451f144456764ed8fe996
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
crax.pro
C2
137.117.100.173:443
Mutex
DEV1LMTXR
Attributes
-
anti_vm
false
-
bsod
true
-
delay
1
-
install
false
-
install_file
RuntimeBroker.exe
-
install_folder
%Temp%
-
pastebin_config
null
aes.plain
Signatures
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1684-55-0x0000000000A70000-0x0000000000A9C000-memory.dmpFilesize
176KB
-
memory/1684-56-0x000000001C090000-0x000000001C092000-memory.dmpFilesize
8KB
-
memory/1684-57-0x00000000005B0000-0x00000000005B8000-memory.dmpFilesize
32KB
-
memory/1684-58-0x0000000000630000-0x0000000000646000-memory.dmpFilesize
88KB
-
memory/1684-59-0x000000001C096000-0x000000001C0B5000-memory.dmpFilesize
124KB
-
memory/1684-61-0x000000001C0B5000-0x000000001C0B6000-memory.dmpFilesize
4KB
-
memory/1684-60-0x00000000005E0000-0x00000000005FA000-memory.dmpFilesize
104KB
-
memory/1684-62-0x000000001C0B8000-0x000000001C0BA000-memory.dmpFilesize
8KB
-
memory/1684-63-0x000000001C0BA000-0x000000001C0BB000-memory.dmpFilesize
4KB