Malware Analysis Report

2025-01-02 12:09

Sample ID 240419-txt3raha77
Target fc59b39a7ecf1372a1d89dd5fa317d0ae1174ff07b11a33fec7069c70e9a0fa9
SHA256 fc59b39a7ecf1372a1d89dd5fa317d0ae1174ff07b11a33fec7069c70e9a0fa9
Tags
rat default asyncrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fc59b39a7ecf1372a1d89dd5fa317d0ae1174ff07b11a33fec7069c70e9a0fa9

Threat Level: Known bad

The file fc59b39a7ecf1372a1d89dd5fa317d0ae1174ff07b11a33fec7069c70e9a0fa9 was found to be: Known bad.

Malicious Activity Summary

rat default asyncrat

AsyncRat

Async RAT payload

Asyncrat family

Unsigned PE

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-19 16:26

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 16:26

Reported

2024-04-19 16:29

Platform

win7-20231129-en

Max time kernel

132s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe"

Signatures

AsyncRat

rat asyncrat

Processes

C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe

"C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe"

Network

Country Destination Domain Proto
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp

Files

memory/3028-0-0x0000000000EA0000-0x0000000000EB2000-memory.dmp

memory/3028-1-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

memory/3028-2-0x000000001AF40000-0x000000001AFC0000-memory.dmp

memory/3028-3-0x000007FEF5B90000-0x000007FEF657C000-memory.dmp

memory/3028-4-0x000000001AF40000-0x000000001AFC0000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 16:26

Reported

2024-04-19 16:29

Platform

win10v2004-20240412-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe"

Signatures

AsyncRat

rat asyncrat

Processes

C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe

"C:\Users\Admin\AppData\Local\Temp\f5e6a0b0c3587f36c025c2bb94929f8b7273f25c5ebdc6755f6a582b01cb8caa.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
IL 20.217.81.50:8080 tcp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
IL 20.217.81.50:8080 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
IL 20.217.81.50:8080 tcp
IL 20.217.81.50:8080 tcp
US 8.8.8.8:53 udp

Files

memory/4412-0-0x0000000000FC0000-0x0000000000FD2000-memory.dmp

memory/4412-1-0x00007FFDFD9A0000-0x00007FFDFE461000-memory.dmp

memory/4412-2-0x0000000003090000-0x00000000030A0000-memory.dmp

memory/4412-3-0x00007FFDFD9A0000-0x00007FFDFE461000-memory.dmp

memory/4412-4-0x0000000003090000-0x00000000030A0000-memory.dmp