Analysis
-
max time kernel
111s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 13:40
Behavioral task
behavioral1
Sample
469b1543f750e181ede00eacb30e0f02.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
469b1543f750e181ede00eacb30e0f02.exe
-
Size
63KB
-
MD5
469b1543f750e181ede00eacb30e0f02
-
SHA1
45d61bdcf02fe75226ee317fbd7412e15034b79a
-
SHA256
f9927c127e880cdbe3ffd14df7c4a915b140886718b13a1785a3942d995f6920
-
SHA512
f57d47d74910aa7aad834442d9777176a6f4a726d06d858f264aa7a6a7b22e14fe1c5927a68f693f3b8f32d9c6255a1bc4e36b883af887303f78d728dc40596a
-
SSDEEP
1536:VhJpLbRQI2WNMGPqPq4i3EKeGeeiMl8GbbXwKssGsMpqKmY7:VhJpLbRQI2WNMGPqPDiZefeFmGbbXCwT
Malware Config
Extracted
Family
asyncrat
Version
Link-Quit
Botnet
Default
C2
8.210.121.56:10165
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1808-132-0x00000000001F0000-0x0000000000206000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
469b1543f750e181ede00eacb30e0f02.exedescription pid process Token: SeDebugPrivilege 1808 469b1543f750e181ede00eacb30e0f02.exe