Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2023 05:18
Static task
static1
Behavioral task
behavioral1
Sample
b17cd69446e5c72f619e0edd5872e457ac9aad4a167650dd8fd551dff27fada6.exe
Resource
win7-20231201-en
windows7-x64
0 signatures
150 seconds
General
-
Target
b17cd69446e5c72f619e0edd5872e457ac9aad4a167650dd8fd551dff27fada6.exe
-
Size
353KB
-
MD5
8f576aee416741e202d2d09d5e796f5a
-
SHA1
0e6337c4eb931365a5c65213fb1a16d309cee64e
-
SHA256
b17cd69446e5c72f619e0edd5872e457ac9aad4a167650dd8fd551dff27fada6
-
SHA512
d8a81abb3d4785fe9837f1a882fbc9ab279c7924b3431546352bb5d4870f61d10d13419f7d57f9e7e7468600b339f20fb747e21bd2a5001192fef27422a7f566
-
SSDEEP
3072:QVkcYL8vEinozxxr0yYUlNLNaBefZo/bG:okcg4oth0yYeNLNLfZiG
Malware Config
Extracted
Family
asyncrat
C2
127.0.0.1:8848
47.104.179.7:8848
Mutex
火绒远程管理
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2456-10-0x0000000003330000-0x000000000338A000-memory.dmp asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b17cd69446e5c72f619e0edd5872e457ac9aad4a167650dd8fd551dff27fada6.exedescription pid process Token: SeDebugPrivilege 2456 b17cd69446e5c72f619e0edd5872e457ac9aad4a167650dd8fd551dff27fada6.exe