Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 23:08
Behavioral task
behavioral1
Sample
bRhS.exe
Resource
win7-20231023-en
5 signatures
150 seconds
General
-
Target
bRhS.exe
-
Size
47KB
-
MD5
8e143fa09a0c859f791a32e7cb625c38
-
SHA1
097428581f4ce478603412d2db261a2c9d5b671d
-
SHA256
8131636f942e8d790a2fe8ac83a00bafd4f7400b3cb9be084dd40c07fc159c2e
-
SHA512
68f5cfbe4f6708591b79e6566f5ff2296d3c2650e5a9009c53e4a8b451c93d4ee6c0551ca996d035483ec6ac4a02838dc3d8fc37e0142b8426cfe308634f97bd
-
SSDEEP
768:996mxUTILWCaS+DiP4MKk81yI/Aics8Yb0geaFwtp3vEgK/J7ZVc6KN:996AKWgLjwgzbb9FwtJnkJ7ZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/5104-0-0x0000000000980000-0x0000000000992000-memory.dmp asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5104 bRhS.exe