Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2023 00:42
Behavioral task
behavioral1
Sample
472512528a7908cda186e815079dd062.exe
Resource
win7-20230712-en
3 signatures
150 seconds
General
-
Target
472512528a7908cda186e815079dd062.exe
-
Size
47KB
-
MD5
472512528a7908cda186e815079dd062
-
SHA1
c473bb386868e1de2d0809cc8d8fa4531a90a06f
-
SHA256
0e4df6585ab07e8e62e0072fcb86f4f6ef0bca491851ab448b0bdcc4ea9e4e0d
-
SHA512
6c6f9faab91fb09a74f5678766100e5cb224bc47a570e486b6c420dd29d427d28778a741e0289ad78f6979389b43d8ce49bb2edd6a1e8eeef739fa081d82607a
-
SSDEEP
768:BOEuILWCKi+DiPtSryQ8AI/Picr8YbAgeioIvEgK/JrZVc6KN:BOtmlS2fAkzbndnkJrZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
213.238.177.40:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4772-133-0x0000000000350000-0x0000000000362000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4772 472512528a7908cda186e815079dd062.exe