Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 10:43
Behavioral task
behavioral1
Sample
c02ca5e7993d8d5069dc602481807c5830c99a32429e70c60a2dffe4935c3ad6.exe
Resource
win7-20220812-en
windows7-x64
5 signatures
150 seconds
General
-
Target
c02ca5e7993d8d5069dc602481807c5830c99a32429e70c60a2dffe4935c3ad6.exe
-
Size
47KB
-
MD5
da80697cf5ec5bddace14f8fdca01125
-
SHA1
dbec35bcf7a89318354106250e95deafb0007d37
-
SHA256
c02ca5e7993d8d5069dc602481807c5830c99a32429e70c60a2dffe4935c3ad6
-
SHA512
16b018e4442a5f86877be27ce33bb0bb828c71c4ca64f904f026be556703f19a920b5b9d34c7788a010aa1582697b66df09a8bf489c3911236a82338f8009294
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08Ybyge6dVvEgK/JnZVc6KN:p96AKWMtKDs4zb1p/nkJnZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
Mutex
ndjiIUAbdsjkIAuibdsiAUI
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/FcHGaN0M
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5052-132-0x0000000000E80000-0x0000000000E92000-memory.dmp asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c02ca5e7993d8d5069dc602481807c5830c99a32429e70c60a2dffe4935c3ad6.exedescription pid process Token: SeDebugPrivilege 5052 c02ca5e7993d8d5069dc602481807c5830c99a32429e70c60a2dffe4935c3ad6.exe