Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
01/07/2023, 07:55
Behavioral task
behavioral1
Sample
33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e.exe
Resource
win10v2004-20230621-en
General
-
Target
33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e.exe
-
Size
47KB
-
MD5
ffbeb794c83fccbeea2f4c0691df6ef9
-
SHA1
89e4a53cd43260923dc7ed87749708352158c26a
-
SHA256
33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e
-
SHA512
5f86f9cef1a09b039e933e1f3214a29c9b1a2609384a3cec0a42f76be57391fb6479f1c5f710c1bbcfa57f532d5173c94c307d08ff80628e4e7f256658ea37e4
-
SSDEEP
768:5OEuILWCKi+Diq2FxhLRaqiOqYbJge903bnvEgK/JTZVc6KN:5OtmqaxXjZbGEUnnkJTZVclN
Malware Config
Extracted
asyncrat
1.0.7
26JUNIO-RODA
20.200.63.2:2525
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3896-133-0x0000000000A40000-0x0000000000A52000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3896 33e08bef26c140a0219a93a0604549a82f98aafdfe198e8a4e9c2bbdfece6e5e.exe