Analysis
-
max time kernel
122s -
max time network
169s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 09:15
Behavioral task
behavioral1
Sample
b28809fa86f51ae1b3f2d050f194515f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
b28809fa86f51ae1b3f2d050f194515f.exe
-
Size
45KB
-
MD5
b28809fa86f51ae1b3f2d050f194515f
-
SHA1
69854987808e0fb9b4ded57870a2d6caed112e63
-
SHA256
f1f368b5e284f7fe05639f009f272024ced3124cfe3d96e09e48ec3bb2c08113
-
SHA512
546bae24f791f7a5720e2a5779c3c67f2ac73ed7607b58ae8d241639f5507df67adefb9637be32bfc255ac51ddd3ca3d8da4744ce9fa9e82ebfe1cca4ed005a4
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:420
2.56.59.167:6606
2.56.59.167:7707
2.56.59.167:8808
2.56.59.167:420
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
true
-
install_file
Service Host: Profile.exe
-
install_folder
%AppData%
-
pastebin_config
null
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/756-54-0x0000000000330000-0x0000000000342000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b28809fa86f51ae1b3f2d050f194515f.exedescription pid process Token: SeDebugPrivilege 756 b28809fa86f51ae1b3f2d050f194515f.exe