Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 18:43
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
sample.exe
-
Size
111KB
-
MD5
763ecd85bc33a191bf5e49d34609620d
-
SHA1
b242596d84854b2e4b1d3adcbab7ef691c8d442a
-
SHA256
17ee5d30b6ec49a413e22ac1e097f9095b7249ce5fdc54f3ca2ed06a99a48f11
-
SHA512
5021189fce083cf830bf6fd4d041cdfd6f30cef1949ed7a969be8b58be595310623992c81b271bcec0ba19fa932d14203e3d5d7df78270e70daa6bb831b1d911
-
SSDEEP
1536:zu/y5Tgv+2BYdEgdbJXSpB/KP+bdb8WeNHl+ix:zu/KTgv+2KagdbJWFb2WNix
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:270
darkvezirv2.duckdns.org:6606
darkvezirv2.duckdns.org:7707
darkvezirv2.duckdns.org:8808
darkvezirv2.duckdns.org:270
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1936-133-0x00000000003F0000-0x0000000000412000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
sample.exedescription pid process Token: SeDebugPrivilege 1936 sample.exe Token: SeDebugPrivilege 1936 sample.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1936-133-0x00000000003F0000-0x0000000000412000-memory.dmpFilesize
136KB
-
memory/1936-134-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB
-
memory/1936-135-0x00000000050B0000-0x0000000005116000-memory.dmpFilesize
408KB
-
memory/1936-136-0x0000000005500000-0x000000000559C000-memory.dmpFilesize
624KB
-
memory/1936-137-0x0000000004D30000-0x0000000004D40000-memory.dmpFilesize
64KB