Analysis
-
max time kernel
108s -
max time network
168s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
25-01-2022 09:15
Behavioral task
behavioral1
Sample
b28809fa86f51ae1b3f2d050f194515f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
b28809fa86f51ae1b3f2d050f194515f.exe
-
Size
45KB
-
MD5
b28809fa86f51ae1b3f2d050f194515f
-
SHA1
69854987808e0fb9b4ded57870a2d6caed112e63
-
SHA256
f1f368b5e284f7fe05639f009f272024ced3124cfe3d96e09e48ec3bb2c08113
-
SHA512
546bae24f791f7a5720e2a5779c3c67f2ac73ed7607b58ae8d241639f5507df67adefb9637be32bfc255ac51ddd3ca3d8da4744ce9fa9e82ebfe1cca4ed005a4
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:420
2.56.59.167:6606
2.56.59.167:7707
2.56.59.167:8808
2.56.59.167:420
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
anti_vm
false
-
bsod
false
-
delay
3
-
install
true
-
install_file
Service Host: Profile.exe
-
install_folder
%AppData%
-
pastebin_config
null
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2640-115-0x0000000000CD0000-0x0000000000CE2000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b28809fa86f51ae1b3f2d050f194515f.exedescription pid process Token: SeDebugPrivilege 2640 b28809fa86f51ae1b3f2d050f194515f.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2640-115-0x0000000000CD0000-0x0000000000CE2000-memory.dmpFilesize
72KB
-
memory/2640-116-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/2640-117-0x0000000005650000-0x00000000056EC000-memory.dmpFilesize
624KB
-
memory/2640-118-0x0000000006020000-0x000000000651E000-memory.dmpFilesize
5.0MB
-
memory/2640-119-0x0000000005BD0000-0x0000000005C36000-memory.dmpFilesize
408KB