General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1239109054819995690/1242913895287488542/injector.exe?ex=664f9144&is=664e3fc4&hm=6a7f6a4fddad087ad3655e2f77cb899a38c2c04f2133c824657001026e131137&
Resource
win10v2004-20240426-en
windows10-2004-x64
15 signatures
150 seconds
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:2035
147.185.221.16:2035
147.185.221.19:2035
121637121.duckdns.org:2035
Mutex
I8EJ82H739UG
Attributes
-
delay
1
-
install
true
-
install_file
Update.exe
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1239109054819995690/1242913895287488542/injector.exe?ex=664f9144&is=664e3fc4&hm=6a7f6a4fddad087ad3655e2f77cb899a38c2c04f2133c824657001026e131137&
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-