Analysis
-
max time kernel
148s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
21-10-2023 23:03
Behavioral task
behavioral1
Sample
download-filearr.exe
Resource
win7-20231020-en
windows7-x64
3 signatures
150 seconds
General
-
Target
download-filearr.exe
-
Size
63KB
-
MD5
fb63ddb5e6b526c7bb1c0559995819ff
-
SHA1
7a142ffb48e65fd4ce71fafee8b75ba2c057f25a
-
SHA256
98155c900f39faac6a42133850329caabc8bf4ebcc90d5037f481aaa86c7240f
-
SHA512
ddb24a9091668be098ac5c4727351bb8d5e502aac4a42590d0cfeaa45991e7699b415d830270624a54e64487c010e4ea3c5d1310863e936f3ea4b4bd51c124a7
-
SSDEEP
1536:KTWI8rSfQ/9Tc1s21vGtoMbbPwb6TjxkscpqKmY7:KTWLrSY/d6thGuMbbPTjx73z
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2052-0-0x0000000000BA0000-0x0000000000BB6000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 download-filearr.exe Token: SeDebugPrivilege 2052 download-filearr.exe