Analysis Overview
SHA256
019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d
Threat Level: Known bad
The file 019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d was found to be: Known bad.
Malicious Activity Summary
Async RAT payload
Asyncrat family
AsyncRat
Checks installed software on the system
Unsigned PE
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-18 19:10
Signatures
Async RAT payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Asyncrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-18 19:10
Reported
2024-06-18 19:13
Platform
win10v2004-20240508-en
Max time kernel
147s
Max time network
156s
Command Line
Signatures
AsyncRat
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe
"C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe"
Network
| Country | Destination | Domain | Proto |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp | |
| BG | 80.76.49.148:4545 | tcp |
Files
memory/3784-0-0x00007FF8D81B3000-0x00007FF8D81B5000-memory.dmp
memory/3784-1-0x0000000000E40000-0x0000000000E58000-memory.dmp
memory/3784-3-0x00007FF8D81B0000-0x00007FF8D8C71000-memory.dmp
memory/3784-4-0x00007FF8D81B3000-0x00007FF8D81B5000-memory.dmp
memory/3784-5-0x00007FF8D81B0000-0x00007FF8D8C71000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-18 19:10
Reported
2024-06-18 19:13
Platform
win11-20240611-en
Max time kernel
146s
Max time network
152s
Command Line
Signatures
AsyncRat
Checks installed software on the system
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe
"C:\Users\Admin\AppData\Local\Temp\019b49d6208392f0ce7d1d166e9e666580a9bb12967f58be5ce5d03afd31ff9d.exe"
Network
| Country | Destination | Domain | Proto |
| BG | 80.76.49.148:4545 | tcp | |
| US | 8.8.8.8:53 | 148.49.76.80.in-addr.arpa | udp |
Files
memory/4700-0-0x00007FFCC3FA3000-0x00007FFCC3FA5000-memory.dmp
memory/4700-1-0x0000000000DD0000-0x0000000000DE8000-memory.dmp
memory/4700-3-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-4-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-6-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-7-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-8-0x00007FFCC3FA3000-0x00007FFCC3FA5000-memory.dmp
memory/4700-9-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-10-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp
memory/4700-11-0x00007FFCC3FA0000-0x00007FFCC4A62000-memory.dmp