Overview
overview
9Static
static
7gasai_self...2).rar
windows7-x64
3gasai_self...2).rar
windows10-2004-x64
3extraced_c...ry.txt
windows7-x64
1extraced_c...ry.txt
windows10-2004-x64
1gasai_crac...ai.exe
windows7-x64
7gasai_crac...ai.exe
windows10-2004-x64
7Gasai.pyc
windows7-x64
3Gasai.pyc
windows10-2004-x64
3gasai_crac...g.json
windows7-x64
3gasai_crac...g.json
windows10-2004-x64
3gasai_crac...ck.dll
windows7-x64
9gasai_crac...ck.dll
windows10-2004-x64
9gasai_crac...t.json
windows7-x64
3gasai_crac...t.json
windows10-2004-x64
3gasai_crac...er.exe
windows7-x64
7gasai_crac...er.exe
windows10-2004-x64
9gasai_crac...e.mmdb
windows7-x64
3gasai_crac...e.mmdb
windows10-2004-x64
3gasai_crac...ot.png
windows7-x64
3gasai_crac...ot.png
windows10-2004-x64
3gasai_crac...mg.jpg
windows7-x64
3gasai_crac...mg.jpg
windows10-2004-x64
3gasai_crac...s.json
windows7-x64
3gasai_crac...s.json
windows10-2004-x64
3gasai_crac...s.json
windows7-x64
3gasai_crac...s.json
windows10-2004-x64
3gasai_crac...no.ico
windows7-x64
3gasai_crac...no.ico
windows10-2004-x64
3gasai_crac...s.json
windows7-x64
3gasai_crac...s.json
windows10-2004-x64
3gasai_crac...s.json
windows7-x64
3gasai_crac...s.json
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 17:24
Behavioral task
behavioral1
Sample
gasai_selfbot_cracked (2).rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
gasai_selfbot_cracked (2).rar
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
extraced_code_memory.txt
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
extraced_code_memory.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
gasai_cracked/Gasai.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
gasai_cracked/Gasai.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Gasai.pyc
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
Gasai.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
gasai_cracked/config.json
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
gasai_cracked/config.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
gasai_cracked/crack.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
gasai_cracked/crack.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
gasai_cracked/device_whitelist.json
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
gasai_cracked/device_whitelist.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
gasai_cracked/launcher.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
gasai_cracked/launcher.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
gasai_cracked/misc/Geolilte.mmdb
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
gasai_cracked/misc/Geolilte.mmdb
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
gasai_cracked/misc/gasaiselfbot.png
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
gasai_cracked/misc/gasaiselfbot.png
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
gasai_cracked/misc/img.jpg
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
gasai_cracked/misc/img.jpg
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
gasai_cracked/misc/spoofed_profiles.json
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
gasai_cracked/misc/spoofed_profiles.json
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
gasai_cracked/misc/tags.json
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
gasai_cracked/misc/tags.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
gasai_cracked/misc/yuno.ico
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
gasai_cracked/misc/yuno.ico
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
gasai_cracked/notifications.json
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
gasai_cracked/notifications.json
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
gasai_cracked/overseer/aliases.json
Resource
win7-20240215-en
Behavioral task
behavioral32
Sample
gasai_cracked/overseer/aliases.json
Resource
win10v2004-20240426-en
General
-
Target
gasai_cracked/Gasai.exe
-
Size
101.8MB
-
MD5
be4c06fafcf75bea728c6fc5c9a8bd8d
-
SHA1
c610f057ed82a128d0360d10160bcefe40e05ad4
-
SHA256
efbce42a1ef148232051b6396f21f308b2fb14e5332dbf0599393187a548abd8
-
SHA512
d126dadb5f67d4d04691d20ae2d22c30b8f39004ff18805d0336109adcbc4d882db4250df484fe404a69c29b4bf8e623414997d79885b8c70395714fa9b7d0c2
-
SSDEEP
3145728:bWpiySwgYRaISeDB1jdvHqpN/SC++VN/SLqrn0/fu/f:bWoySwx2s1jVKSCcqV
Malware Config
Signatures
-
Loads dropped DLL 7 IoCs
pid Process 2056 Gasai.exe 2056 Gasai.exe 2056 Gasai.exe 2056 Gasai.exe 2056 Gasai.exe 2056 Gasai.exe 2056 Gasai.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2056 1908 Gasai.exe 29 PID 1908 wrote to memory of 2056 1908 Gasai.exe 29 PID 1908 wrote to memory of 2056 1908 Gasai.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\gasai_cracked\Gasai.exe"C:\Users\Admin\AppData\Local\Temp\gasai_cracked\Gasai.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\gasai_cracked\Gasai.exe"C:\Users\Admin\AppData\Local\Temp\gasai_cracked\Gasai.exe"2⤵
- Loads dropped DLL
PID:2056
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD550abf0a7ee67f00f247bada185a7661c
SHA10cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528
-
Filesize
20KB
MD5de5695f26a0bcb54f59a8bc3f9a4ecef
SHA199c32595f3edc2c58bdb138c3384194831e901d6
SHA256e9539fce90ad8be582b25ab2d5645772c2a5fb195e602ecdbf12b980656e436a
SHA512df635d5d51cdea24885ae9f0406f317ddcf04ecb6bfa26579bb2e256c457057607844ded4b52ff1f5ca25abe29d1eb2b20f1709cf19035d3829f36bbe31f550f
-
Filesize
20KB
MD574c264cffc09d183fcb1555b16ea7e4b
SHA10b5b08cdf6e749b48254ac811ca09ba95473d47c
SHA256a8e2fc077d9a7d2faa85e1e6833047c90b22c6086487b98fc0e6a86b7bf8bf09
SHA512285afbcc39717510ced2ed096d9f77fc438268ecaa59cff3cf167fcc538e90c73c67652046b0ee379e0507d6e346af79d43c51a571c6dd66034f9385a73d00d1
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
C:\Users\Admin\AppData\Local\Temp\_MEI19082\jedi\third_party\typeshed\third_party\3\docutils\parsers\__init__.pyi
Filesize63B
MD584a27291937d76e46b277653002601f2
SHA1fe60efb40aeeee2998bb07245d4f9571ad08825f
SHA256ddf071712a6926be84384714a23bdf946dc47a083b96fd90a7474d41020bacfe
SHA512e489e83fd33fdc8ba88954725f79c2132bc4162ba713c72b190b790b4a368e3ceb024d7b8bceec4544123a5435fdfd987876f1b2542da06cba899f5ac72945be
-
Filesize
4.2MB
MD5a1185bef38fdba5e3fe6a71f93a9d142
SHA1e2b40f5e518ad000002b239a84c153fdc35df4eb
SHA2568d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e
SHA512cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4
-
Filesize
1.1MB
MD53b337c2d41069b0a1e43e30f891c3813
SHA1ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499
-
Filesize
20KB
MD5d92e6a007fc22a1e218552ebfb65da93
SHA13c9909332e94f7b7386664a90f52730f4027a75a
SHA25603bd3217eae0ef68521b39556e7491292db540f615da873dd8da538693b81862
SHA512b8b0e6052e68c08e558e72c168e4ff318b1907c4dc5fc1cd1104f5cae7cc418293013dabbb30c835a5c35a456e1cb22cc352b7ae40f82b9b7311bb7419d854c7
-
Filesize
20KB
MD5cb39eea2ef9ed3674c597d5f0667b5b4
SHA1c133dc6416b3346fa5b0f449d7cc6f7dbf580432
SHA2561627b921934053f1f7d2a19948aee06fac5db8ee8d4182e6f071718d0681f235
SHA5122c65014dc045a2c1e5f52f3fea4967d2169e4a78d41fe56617ce9a4d5b30ebf25043112917ff3d7d152744ddef70475937ae0a7f96785f97dcefafe8e6f14d9c