Analysis
-
max time kernel
90s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 01:09
Behavioral task
behavioral1
Sample
bH8p.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
bH8p.exe
-
Size
45KB
-
MD5
c78feb68e841eefc532eb5d3993ccf9c
-
SHA1
914616b3da61d38fab47e9213d08bd628175d4c9
-
SHA256
ab9a4d30723683772c778b0433641695624616d7c96e09948e8beb3d58f48818
-
SHA512
98c637cf0b4badb9d8700453ffc0e9587fa73495e27c3e5b2a5f07aaf464247cc958c1828e8f4e72b4a8b41f82876ed7c71178650d3f17d8d5398c5c33ffe4b5
-
SSDEEP
768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3itIpWnX9BDGm6NDs1BDZSx:vuwCfTgp/2OKYDy3bCXSa2X9BDGm6sdQ
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
146.190.69.247:6606
146.190.69.247:7707
146.190.69.247:8808
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2376-132-0x0000000000980000-0x0000000000992000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
bH8p.exedescription pid process Token: SeDebugPrivilege 2376 bH8p.exe