Analysis
-
max time kernel
149s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
01/07/2023, 07:42
Behavioral task
behavioral1
Sample
aliexe.exe
Resource
win7-20230621-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
aliexe.exe
Resource
win10v2004-20230621-en
6 signatures
150 seconds
General
-
Target
aliexe.exe
-
Size
62KB
-
MD5
63bf8f12fe0888f2ff1bde122aeca21f
-
SHA1
0aaffbdf45abc2cd919d32d19206bbbd04e56802
-
SHA256
ed7156a259cecc750c121faed21545185d9436de677556ef9e271e519073fb34
-
SHA512
3b75ef81b6911d3126ed2430554143f0801da7cc3e1d1685b3b2b677cacd4113cd9bd27cc98b83b5e78aea789a05c8b9d7fa6fc2b7a713d5db161079d78ef3e9
-
SSDEEP
768:rHrBQOGhV1Xj+IfxXiYo3PbE5HGfAp0IMeIcm7/RrabXFEY88phq73chWkq32WxK:rLKVFQY95mIaP1cyobXda7F2nq7wx
Score
10/10
Malware Config
Extracted
Family
asyncrat
Version
| Edit 3LOSH RAT
Botnet
LEDGER MOHAMED POP
C2
dynsys.is-a-guru.com:6606
dynsys.is-a-guru.com:7707
dynsys.is-a-guru.com:8808
Mutex
AsyncMutex_g
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1556-54-0x0000000000170000-0x0000000000186000-memory.dmp asyncrat -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1556 aliexe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1556 aliexe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1556 aliexe.exe