Analysis
-
max time kernel
91s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2022 10:04
Behavioral task
behavioral1
Sample
b7fdc8ea85c9b3b6a7db8dffa6e6ab40.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
b7fdc8ea85c9b3b6a7db8dffa6e6ab40.exe
-
Size
47KB
-
MD5
b7fdc8ea85c9b3b6a7db8dffa6e6ab40
-
SHA1
c0ae5d7dd6cdb4f3be8fb01db26ffcd5fe078f76
-
SHA256
111a4d926a4c6cf6eab9ad519c381db560fea5aec1ef5ad6ac427f034dbd825d
-
SHA512
de83e7aa181fcf022c1b29d352a626f7b575604e2c801f763fb0409a26b0101eca6bc49862b6a24c7a73054802a181184206ef5a56c3fb87ae99fd1c8315943e
-
SSDEEP
768:dOEuILWCKi+DinObi/UYbJge1I8vXuvEgK/J9lZVc6KN:dOtmntbbGHnkJ3ZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
44.192.67.149:4784
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4628-132-0x0000000000EE0000-0x0000000000EF2000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b7fdc8ea85c9b3b6a7db8dffa6e6ab40.exedescription pid process Token: SeDebugPrivilege 4628 b7fdc8ea85c9b3b6a7db8dffa6e6ab40.exe