Analysis
-
max time kernel
61s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2023 04:46
Behavioral task
behavioral1
Sample
a2a7dc85a78e43dd4f3412b73d5a9118.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a2a7dc85a78e43dd4f3412b73d5a9118.exe
-
Size
53KB
-
MD5
a2a7dc85a78e43dd4f3412b73d5a9118
-
SHA1
49fbd27ece106d3979461d40c10f277ed1907c50
-
SHA256
04f5fbfe8dee8d02c12f92e02c9dc24368298daadb76068ee911f00b06d9e36c
-
SHA512
db01128fc771f582a653860ea9b489eaa8c1c059594c79692829123b15277719cd057514ffc16e5e16414c6197c784e8c12421a0cc9beae974df5191a6337c4c
-
SSDEEP
1536:ku1a+1T3xN2s2NeyHSCmb00iMSdBvbMLZWN:kucST3xN2s2Neyy7b0CSTbMlWN
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
185.250.241.219:6606
185.250.241.219:7707
185.250.241.219:8808
185.250.241.219:6066
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_file
Poliçe.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4872-132-0x0000000000920000-0x0000000000932000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a2a7dc85a78e43dd4f3412b73d5a9118.exedescription pid process Token: SeDebugPrivilege 4872 a2a7dc85a78e43dd4f3412b73d5a9118.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4872-132-0x0000000000920000-0x0000000000932000-memory.dmpFilesize
72KB
-
memory/4872-133-0x0000000005AF0000-0x0000000005B8C000-memory.dmpFilesize
624KB
-
memory/4872-134-0x0000000006140000-0x00000000066E4000-memory.dmpFilesize
5.6MB
-
memory/4872-135-0x0000000005C00000-0x0000000005C66000-memory.dmpFilesize
408KB