Analysis
-
max time kernel
115s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-10-2022 18:46
Behavioral task
behavioral1
Sample
30bd3a34d381539616ee0f790964a4bf.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
30bd3a34d381539616ee0f790964a4bf.exe
-
Size
47KB
-
MD5
30bd3a34d381539616ee0f790964a4bf
-
SHA1
bb5ea5d3284b88658f324f4979bf897daca2595b
-
SHA256
efc68526906a8aa71785e96b05c236349c02f089b0f538852e17a0fed368bcd4
-
SHA512
eef72f350d41533ca3e90b80a565184b05b773cfd7ce2ce68499318be8cb1e8f1acc7d40736ca12682bc400877871e5c02a933880f461c235c421f59722af5a3
-
SSDEEP
768:yuScq5TAYGTqWU8j+zmo2qL5sQZPI7WD0b5vjJUXLWF29BDZUx:yuScq5TA5c2D7Wob5bJUXLWITdUx
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:51585
20.212.19.59:6606
20.212.19.59:7707
20.212.19.59:8808
20.212.19.59:51585
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4632-132-0x0000000000970000-0x0000000000982000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4632 30bd3a34d381539616ee0f790964a4bf.exe