Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 02:22

General

  • Target

    8215ed905544d217f656b5b226f71798970698eefa4f24cb48532778d8409baa.exe

  • Size

    63KB

  • MD5

    e52ba92d25281e90aa7f27bd3719951f

  • SHA1

    f67b856dbac5bdd315dce1df2738a1b4f88f4f39

  • SHA256

    8215ed905544d217f656b5b226f71798970698eefa4f24cb48532778d8409baa

  • SHA512

    96a3e30a0fbe049f69b07155cfe3e1a431ff63e8dabc4baa13eada61668ebc4d4171fdaf70fb7fac4d92fc7e8383fa400dcf11eeaee98e47511857e30a23f53d

  • SSDEEP

    1536:QhB5LrUwk4XO01VIqREWN6y3TbbhwsJaJcGODpqKmY7:QhB5LrUwk4XVVIqRfTbbh1Jacgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

94.232.249.204:6660

Mutex

Venom_RAT_HVNC_Mutex_Venom RAT_HVNC

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8215ed905544d217f656b5b226f71798970698eefa4f24cb48532778d8409baa.exe
    "C:\Users\Admin\AppData\Local\Temp\8215ed905544d217f656b5b226f71798970698eefa4f24cb48532778d8409baa.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3884

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3884-0-0x0000000000940000-0x0000000000956000-memory.dmp

    Filesize

    88KB

  • memory/3884-1-0x00007FFF5D333000-0x00007FFF5D335000-memory.dmp

    Filesize

    8KB

  • memory/3884-2-0x00007FFF5D330000-0x00007FFF5DDF1000-memory.dmp

    Filesize

    10.8MB

  • memory/3884-3-0x00007FFF5D330000-0x00007FFF5DDF1000-memory.dmp

    Filesize

    10.8MB