Malware Analysis Report

2024-09-22 07:03

Sample ID 240602-nlnhyabe7t
Target Infected1.exe
SHA256 8fd8f4dca3ef13c8f441bdb8e0972a1207391d7a4e7429a1428143ad9ea1aa17
Tags
asyncrat default rat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8fd8f4dca3ef13c8f441bdb8e0972a1207391d7a4e7429a1428143ad9ea1aa17

Threat Level: Known bad

The file Infected1.exe was found to be: Known bad.

Malicious Activity Summary

asyncrat default rat

Async RAT payload

Asyncrat family

AsyncRat

Unsigned PE

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-02 11:29

Signatures

Async RAT payload

rat
Description Indicator Process Target
N/A N/A N/A N/A

Asyncrat family

asyncrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-02 11:29

Reported

2024-06-02 11:31

Platform

win7-20240221-en

Max time kernel

139s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Infected1.exe"

Signatures

AsyncRat

rat asyncrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Infected1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Infected1.exe

"C:\Users\Admin\AppData\Local\Temp\Infected1.exe"

Network

Country Destination Domain Proto
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp

Files

memory/2484-0-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

memory/2484-1-0x0000000000F50000-0x0000000000F66000-memory.dmp

memory/2484-2-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

memory/2484-3-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

memory/2484-4-0x000007FEF5D33000-0x000007FEF5D34000-memory.dmp

memory/2484-5-0x000007FEF5D30000-0x000007FEF671C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-02 11:29

Reported

2024-06-02 11:31

Platform

win10v2004-20240426-en

Max time kernel

140s

Max time network

149s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Infected1.exe"

Signatures

AsyncRat

rat asyncrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Infected1.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Infected1.exe

"C:\Users\Admin\AppData\Local\Temp\Infected1.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
DE 193.161.193.99:44548 tcp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
DE 193.161.193.99:44548 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
US 8.8.8.8:53 99.193.161.193.in-addr.arpa udp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp
DE 193.161.193.99:44548 tcp

Files

memory/1084-0-0x00000000007B0000-0x00000000007C6000-memory.dmp

memory/1084-1-0x00007FFD9E693000-0x00007FFD9E695000-memory.dmp

memory/1084-2-0x00007FFD9E690000-0x00007FFD9F151000-memory.dmp

memory/1084-3-0x00007FFD9E690000-0x00007FFD9F151000-memory.dmp