Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
27/04/2023, 05:35
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10-20230220-en
6 signatures
150 seconds
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
5b9e5723583eb31b9d67c46b2825d6bb
-
SHA1
44a867a74e714a77e0fc6eda42e9865370ba0937
-
SHA256
4dcb2fbc2fcfc15556b81e2b07f84427f80435b1b312fea8b18e688a565eac6e
-
SHA512
fade32705bd80dcdbbdeda9415ac3d7fdb1872803808f6ba000d365723642ed863ee70da38ab31906b0a83fb0aa84ea25ad50bf30a980b481a9791f95674d0ab
-
SSDEEP
768:nugSNTokqd97WUHgAKpmo2q7HKjGKG6PIyzjbFgX3i2usR0FiXOhqAm0BDZ/x:nugSNToTdQT2mKYDy3bCXSpsCFFqABdp
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:61288
146.70.165.10:61288
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_file
Microsoft Update.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1648-133-0x0000000000800000-0x0000000000812000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1648 AsyncClient.exe