Analysis
-
max time kernel
95s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
22-03-2023 16:42
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20230220-en
3 signatures
1800 seconds
General
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
4a06f779b6eb4a3dc38653e135cb5525
-
SHA1
fff8d15423bcd406e419516b6904b5e1e783cc4f
-
SHA256
751c34b8a0a6ef477d36d5b7d32c9a887ae71a174700029affe0a0f189bdd383
-
SHA512
48706cdb17821198e7a2d2452a8e44aed5d156e5ac08b3a2b6a71a47989716bf9edd1167236a71b7383a175f59d5e1205e60ddcba7926b161b5d69d121099677
-
SSDEEP
768:muwCfTg46YbWUn8jjmo2qrdYDdRvwYMAJ7MWPI7jP0boz3lY7XycxkgyGP2pHhGo:muwCfTgp/2q0nMAU7jMboz3S7Xy2PcHF
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/824-54-0x0000000000C60000-0x0000000000C72000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AsyncClient.exedescription pid process Token: SeDebugPrivilege 824 AsyncClient.exe Token: SeDebugPrivilege 824 AsyncClient.exe