Analysis
-
max time kernel
118s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
09/10/2023, 05:29
Behavioral task
behavioral1
Sample
44e5d3a0cb17677a8fe7827e3d56723380dd12612359125c61266b99ed2f1903.exe
Resource
win7-20230831-en
General
-
Target
44e5d3a0cb17677a8fe7827e3d56723380dd12612359125c61266b99ed2f1903.exe
-
Size
45KB
-
MD5
8d9d38976b83cb8938fffd7ae75f5f5b
-
SHA1
146249504fe6ccba72e848ca933cf0874ee85346
-
SHA256
44e5d3a0cb17677a8fe7827e3d56723380dd12612359125c61266b99ed2f1903
-
SHA512
7e77dc6892e53d6fad10e9faf98d6fe0c087d36702765bda8c8e6719c1a5740b68e3ad610bc3f86a9e38284ccafbd54f58833efbe688ebed66360529e7dcf485
-
SSDEEP
768:Eu/6ZTgoiziWUUM9rmo2qrb1C3cgyPIIzjbfgX3iPK1JzleRBDZTx:Eu/6ZTgle20tgbI3boXSQNlevdTx
Malware Config
Extracted
asyncrat
0.5.7B
Default
bestsuccess.ddns.net:2442
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3008-0-0x0000000000C90000-0x0000000000CA2000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3008 44e5d3a0cb17677a8fe7827e3d56723380dd12612359125c61266b99ed2f1903.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9