Resubmissions

24-10-2023 12:00

231024-n6mgdacg4s 10

24-10-2023 11:52

231024-n1sq7see73 10

24-10-2023 11:33

231024-nnxjmace71 10

24-10-2023 11:30

231024-nl9feace6y 10

24-10-2023 11:27

231024-nkf3gace5v 10

24-10-2023 09:15

231024-k73m7sdg27 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-10-2023 12:00

General

  • Target

    rat.exe

  • Size

    512KB

  • MD5

    738c07f22ff7922d8fcff5ba6555dbb3

  • SHA1

    86a08e0cb6b92b08d358c75e47dd5325b4aba323

  • SHA256

    7a83115ab46ba6a3c237d78f32bd3386ff4d4d7cd7b06ad731fe8071b2246278

  • SHA512

    c49a900d0165f56cc513c6e4e6551a69f3b49c8c0a9719ac925c6004b69554540999d1f3c9d63c397564e6ec67bb65cc31fa6e0ff9c2685a325fea7c8c0868dd

  • SSDEEP

    3072:7HivS2XIxjLnBnbmOKIudTziZ3w2OAGzCZ44Lz/w:LxvnBJh+T63wZzCZ44Lzw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

Mutex

DcRatMutex_qwqdanchun

Attributes
  • delay

    1

  • install

    false

  • install_file

    svchost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rat.exe
    "C:\Users\Admin\AppData\Local\Temp\rat.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4316-0-0x000001BC3B0B0000-0x000001BC3B0FC000-memory.dmp

    Filesize

    304KB

  • memory/4316-1-0x000001BC3B4C0000-0x000001BC3B4DC000-memory.dmp

    Filesize

    112KB

  • memory/4316-2-0x000001BC3CE90000-0x000001BC3CEA2000-memory.dmp

    Filesize

    72KB

  • memory/4316-3-0x00007FFD01390000-0x00007FFD01E51000-memory.dmp

    Filesize

    10.8MB

  • memory/4316-4-0x000001BC3CED0000-0x000001BC3CEE6000-memory.dmp

    Filesize

    88KB

  • memory/4316-5-0x000001BC3CF30000-0x000001BC3CF40000-memory.dmp

    Filesize

    64KB

  • memory/4316-6-0x00007FFD01390000-0x00007FFD01E51000-memory.dmp

    Filesize

    10.8MB

  • memory/4316-7-0x000001BC3CF30000-0x000001BC3CF40000-memory.dmp

    Filesize

    64KB

  • memory/4316-8-0x000001BC3B610000-0x000001BC3B626000-memory.dmp

    Filesize

    88KB