Analysis
-
max time kernel
29s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 10:45
Behavioral task
behavioral1
Sample
832-55-0x0000000028480000-0x0000000028492000-memory.exe
Resource
win7-20230220-en
3 signatures
150 seconds
General
-
Target
832-55-0x0000000028480000-0x0000000028492000-memory.exe
-
Size
72KB
-
MD5
d1e78803f0fbbecc31907042f3ae0f91
-
SHA1
fdff696ae5e077ec330bb2412189a33c206f1367
-
SHA256
fd08f83bbef4c7f7e61ad15a9a1ffad1822fc715fa492aafe94b460b03b631f1
-
SHA512
7b60fc5da67c580656e4c48604e466bc23a102a64ddc42edc6dae4c2a7b75d837b03642ea6823e338920d520b2e2617e55f9accd3badc72f7bb4e442dbf147e6
-
SSDEEP
1536:ju/6ZTgle2Y1G/1W9q3blXSUjD0Ezd/x:ju/iTgle2pW9q3blRztx
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
addimq.duckdns.org:7878
addimq.duckdns.org:9909
addimq.duckdns.org:6568
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2032-54-0x0000000000AA0000-0x0000000000AB2000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2032 832-55-0x0000000028480000-0x0000000028492000-memory.exe