Analysis
-
max time kernel
105s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 21:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
12edfae99bb76bc207f28f94608167a0N.dll
Resource
win7-20240708-en
windows7-x64
1 signatures
120 seconds
General
-
Target
12edfae99bb76bc207f28f94608167a0N.dll
-
Size
2.4MB
-
MD5
12edfae99bb76bc207f28f94608167a0
-
SHA1
595d7b4bfc63b9c6752236ad476dfe38e785d2f7
-
SHA256
e78f3b078feeb0f431cdc2329f2ef7313b072d3fdb7073cb6aea12c7873e7aaf
-
SHA512
a38791f4e92fd1359fb6e44a6b6943dee288ba89d3b1b17524363405c24db2a6c50ef3a4f95565e5f464d2a4b59b0303608285e9f4728cdbe78a9ff0e527b35b
-
SSDEEP
49152:UeLJJtmeOJZFurwIrYRZqpxh2Q9yjzIjC/q8tfNstbwK/eWL0yqbbt:INIrYLYhtvMtfNstsQVL0yqbbt
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
Mutex
B6nFmGTapMtl
Attributes
-
delay
3
-
install
false
-
install_file
curl.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/3WsmZuWC
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1388-2-0x000001A3068B0000-0x000001A3068C2000-memory.dmp family_asyncrat -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe