Malware Analysis Report

2024-10-23 19:25

Sample ID 240524-yn1ldshb4y
Target e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe
SHA256 e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f
Tags
rat client asyncrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f

Threat Level: Known bad

The file e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe was found to be: Known bad.

Malicious Activity Summary

rat client asyncrat

AsyncRat

Async RAT payload

Asyncrat family

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-05-24 19:56

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-24 19:56

Reported

2024-05-24 19:59

Platform

win7-20240221-en

Max time kernel

130s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe"

Signatures

AsyncRat

rat asyncrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe

"C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 uk2.localto.net udp
GB 140.238.91.110:3793 uk2.localto.net tcp
GB 140.238.91.110:3793 uk2.localto.net tcp

Files

memory/3036-0-0x000007FEF5DA3000-0x000007FEF5DA4000-memory.dmp

memory/3036-1-0x0000000000910000-0x0000000000926000-memory.dmp

memory/3036-2-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

memory/3036-3-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

memory/3036-4-0x000007FEF5DA3000-0x000007FEF5DA4000-memory.dmp

memory/3036-5-0x000007FEF5DA0000-0x000007FEF678C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-24 19:56

Reported

2024-05-24 19:59

Platform

win10v2004-20240508-en

Max time kernel

133s

Max time network

134s

Command Line

"C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe"

Signatures

AsyncRat

rat asyncrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe

"C:\Users\Admin\AppData\Local\Temp\e13360fe12492ad8b6f72d8cbd0969cfab0003e9898d13afe1c5de7bbb143b1f.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 uk2.localto.net udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
GB 140.238.91.110:3793 uk2.localto.net tcp
US 8.8.8.8:53 110.91.238.140.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
GB 140.238.91.110:3793 uk2.localto.net tcp

Files

memory/2284-0-0x0000000000220000-0x0000000000236000-memory.dmp

memory/2284-1-0x00007FFDED870000-0x00007FFDEDA65000-memory.dmp

memory/2284-2-0x00007FFDED870000-0x00007FFDEDA65000-memory.dmp

memory/2284-3-0x00007FFDED870000-0x00007FFDEDA65000-memory.dmp

memory/2284-4-0x00007FFDED870000-0x00007FFDEDA65000-memory.dmp