General
-
Target
kam.exe
-
Size
6.6MB
-
Sample
240708-dv23ksscnf
-
MD5
a6e278e8a725750c14090f222a034bf8
-
SHA1
e4e25334525147214ed5c83fe3c6e06f9e72981d
-
SHA256
ab8c7950c7cf1c5d5f0f1953f725e50cc882b41dc3c934554cc03ce79b52ffce
-
SHA512
f13b8c2da7b7191177b367fa4850a5c2e1b2b43137bfce0795977bb1c0139ac6ca1f8b6ecfc7ded323a86c831d1e3e2533a35ee86e0ff3bb8bc2d740b080674e
-
SSDEEP
98304:pCO86/jo1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkKQg:MODLofdQmRKuErSEEJwdFvZnCkK
Behavioral task
behavioral1
Sample
kam.exe
Resource
win7-20240705-en
Malware Config
Extracted
asyncrat
Default
anachyyyyy.duckdns.org:7878
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
kam.exe
-
Size
6.6MB
-
MD5
a6e278e8a725750c14090f222a034bf8
-
SHA1
e4e25334525147214ed5c83fe3c6e06f9e72981d
-
SHA256
ab8c7950c7cf1c5d5f0f1953f725e50cc882b41dc3c934554cc03ce79b52ffce
-
SHA512
f13b8c2da7b7191177b367fa4850a5c2e1b2b43137bfce0795977bb1c0139ac6ca1f8b6ecfc7ded323a86c831d1e3e2533a35ee86e0ff3bb8bc2d740b080674e
-
SSDEEP
98304:pCO86/jo1hZlzb71QGQCPDbZfxz87le5BLoHLSLgj8NnJwFDDEy2nZsBJ1nCkKQg:MODLofdQmRKuErSEEJwdFvZnCkK
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Loads dropped DLL
-