Analysis

  • max time kernel
    30s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2023 03:26

General

  • Target

    0f3a96431372569b08e4ff29618705e5.exe

  • Size

    47KB

  • MD5

    0f3a96431372569b08e4ff29618705e5

  • SHA1

    fa10c0c72a91603dc14aad5200a9db52f8409ee3

  • SHA256

    2571269949580368a87a0e89bcecc0957e539a6a0132756aa998fab9e35ddc82

  • SHA512

    73c86dc6f9ffc948da986edd6cc5a48c1f8038e9db9cd8500dad3c8b4cf21943587b8eab4e6eb222f8733176dd00aeb542b3d5f80dd8435ad0fafa493133c4fa

  • SSDEEP

    768:auwCfTg46YbWUn8jjmo2qrrmux2zfPIwtzNQwN630bnjmrvcyiqhYdNx/BDZ8x:auwCfTgp/2a/M4wtckbnjgUvdNxJd8x

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

45.147.45.253:30303

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f3a96431372569b08e4ff29618705e5.exe
    "C:\Users\Admin\AppData\Local\Temp\0f3a96431372569b08e4ff29618705e5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2036

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000001090000-0x00000000010A2000-memory.dmp
    Filesize

    72KB

  • memory/2036-55-0x0000000000E70000-0x0000000000EB0000-memory.dmp
    Filesize

    256KB

  • memory/2036-63-0x0000000000E70000-0x0000000000EB0000-memory.dmp
    Filesize

    256KB