Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 10:45
Behavioral task
behavioral1
Sample
832-55-0x0000000028480000-0x0000000028492000-memory.exe
Resource
win7-20230220-en
General
-
Target
832-55-0x0000000028480000-0x0000000028492000-memory.exe
-
Size
72KB
-
MD5
d1e78803f0fbbecc31907042f3ae0f91
-
SHA1
fdff696ae5e077ec330bb2412189a33c206f1367
-
SHA256
fd08f83bbef4c7f7e61ad15a9a1ffad1822fc715fa492aafe94b460b03b631f1
-
SHA512
7b60fc5da67c580656e4c48604e466bc23a102a64ddc42edc6dae4c2a7b75d837b03642ea6823e338920d520b2e2617e55f9accd3badc72f7bb4e442dbf147e6
-
SSDEEP
1536:ju/6ZTgle2Y1G/1W9q3blXSUjD0Ezd/x:ju/iTgle2pW9q3blRztx
Malware Config
Extracted
asyncrat
0.5.7B
Default
addimq.duckdns.org:7878
addimq.duckdns.org:9909
addimq.duckdns.org:6568
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4320-133-0x0000000000CA0000-0x0000000000CB2000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 832-55-0x0000000028480000-0x0000000028492000-memory.exe