Analysis
-
max time kernel
91s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 03:20
Behavioral task
behavioral1
Sample
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe
-
Size
45KB
-
MD5
a46741ec2864a2c9c7cfe6afa5f38873
-
SHA1
58019aaf83bb12c84e5df67b01bfb3295006c3ae
-
SHA256
50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961
-
SHA512
1c291721f2b7b7fd0292521829502c4263bd4358800f1b4279f8f4cdf6c0b02d964ed71035ad2ca3f53ff71ca530601b7eedb3bba48778a3f9daa5ab2cc3bc60
-
SSDEEP
768:IeI6b/GoWoGX8ye91Vstjb0gxh5tdd3EvMCPEJAAuYDDG62tYcFmVc6K:IwGsYlbbxryvnAtDG6KmVcl
Malware Config
Extracted
Family
asyncrat
Version
0.5.6B
C2
koradon.giize.com:6606
Mutex
vomsklihddikoeyxag
Attributes
-
delay
5
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Detects file containing reversed ASEP Autorun registry keys 1 IoCs
resource yara_rule behavioral2/memory/1464-0-0x0000000000780000-0x0000000000792000-memory.dmp INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1464 50a16971e1979b9fedd35969fb3e0658480d2d18139a935d065f76c002c8a961.exe