Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2023 01:55
Behavioral task
behavioral1
Sample
payload1.exe
Resource
win7-20231020-en
windows7-x64
6 signatures
150 seconds
General
-
Target
payload1.exe
-
Size
45KB
-
MD5
7f11f6d1e63801a069b5242455439045
-
SHA1
ed9176679792aff0b09a45f14dcec0e15973b692
-
SHA256
128ee5116439827966392f77da9527f5f586ff5efa62a8f3f50c7d7a2e56757a
-
SHA512
14785bd6b5673e107c319bfdb1ed6265f1e525e3f0e314d63a291237b127c9fc4574abc1e39a39d3c186944301d9c8bbdbb522a5f2bafede4c633d88fd743b76
-
SSDEEP
768:mu/dRTUo0HQbWUnmjSmo2qMwKjPGaG6PIyzjbFgX3ixKF335WNVYBDZyx:mu/dRTUPE2kKTkDy3bCXScZPdyx
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
YAHOO
C2
iced.ddns.net:6606
Mutex
rHxUsNj7QMwN
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/3084-9-0x00000000068B0000-0x000000000694C000-memory.dmp family_zgrat_v1 -
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3084-1-0x00000000003A0000-0x00000000003B2000-memory.dmp asyncrat -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3084 payload1.exe