Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
24-09-2023 02:41
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20230831-en
5 signatures
150 seconds
General
-
Target
AsyncClient.exe
-
Size
66KB
-
MD5
622ab14ea61e807470a8a4ed2c9bf8c3
-
SHA1
154627f197759f94d648fb9b6c653009e0714d4e
-
SHA256
d3caf7e6ce1fa395073fc052df6e1f1075281a607920643ee5016477271bc74b
-
SHA512
55f7b5d56e39b6897e90724238709ee1c7791798e91547b4f40c38e2144ac87534466fb594f7cc20a6227771493d5ea2133fd674257dfced456ba17ef2a9a429
-
SSDEEP
1536:tiUukIbck1ZFKulUYFWCZvmvxZETYb6UidCJzpvvrgTGQ3:tiJkIbckFKulUYFWC4JZE0b6U2CJF3Wb
Malware Config
Extracted
Family
asyncrat
Version
| Edit 3LOSH RAT
Botnet
BTC
C2
127.0.0.1:555
127.0.0.1:6606
127.0.0.1:7707
65.21.177.234:555
65.21.177.234:6606
65.21.177.234:7707
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2228-0-0x0000000000370000-0x0000000000386000-memory.dmp asyncrat -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
AsyncClient.exepid process 2228 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AsyncClient.exedescription pid process Token: SeDebugPrivilege 2228 AsyncClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
AsyncClient.exepid process 2228 AsyncClient.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2228-0-0x0000000000370000-0x0000000000386000-memory.dmpFilesize
88KB
-
memory/2228-1-0x0000000074310000-0x00000000749FE000-memory.dmpFilesize
6.9MB
-
memory/2228-2-0x0000000004970000-0x00000000049B0000-memory.dmpFilesize
256KB
-
memory/2228-3-0x0000000074310000-0x00000000749FE000-memory.dmpFilesize
6.9MB
-
memory/2228-4-0x0000000004970000-0x00000000049B0000-memory.dmpFilesize
256KB