Analysis

  • max time kernel
    136s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-07-2024 10:22

General

  • Target

    n.exe

  • Size

    58KB

  • MD5

    45f751b95f8f7b7109037d93c31dca94

  • SHA1

    5c206b274e942fb3eb3242a3ba7cb83ca7c8b3bc

  • SHA256

    21110b3fea3acb08b2473cd1ab0cc419ca0abfb1a9d49e380eb2d78bc80b020f

  • SHA512

    be072dce776158d27069eb96d9332e62bb761823e3e158083f64304879fc00d538b1bfa78d4ed55efb50c5630f043501da58923d7d5f30c1e26d9f52cea878a0

  • SSDEEP

    1536:tEKEJoIoSSTTRBfHiCvSbidURpD8kXYFvf+:2Kmo3tBlSbieRXYVm

Malware Config

Extracted

Family

asyncrat

Version

SuperBoo Rat v1.1

Botnet

Default

C2

127.0.0.1:1337

127.0.0.1:5552

127.0.0.1:6703

le-pencil.gl.at.ply.gg:1337

le-pencil.gl.at.ply.gg:5552

le-pencil.gl.at.ply.gg:6703

Mutex

SuperBoo_mtex_920393

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\n.exe
    "C:\Users\Admin\AppData\Local\Temp\n.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2488-0-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2488-1-0x0000000000440000-0x0000000000454000-memory.dmp

    Filesize

    80KB

  • memory/2488-2-0x00000000745E0000-0x0000000074D91000-memory.dmp

    Filesize

    7.7MB

  • memory/2488-5-0x00000000059D0000-0x0000000005A6C000-memory.dmp

    Filesize

    624KB

  • memory/2488-6-0x00000000062B0000-0x0000000006856000-memory.dmp

    Filesize

    5.6MB

  • memory/2488-7-0x0000000005D70000-0x0000000005DD6000-memory.dmp

    Filesize

    408KB

  • memory/2488-8-0x00000000745EE000-0x00000000745EF000-memory.dmp

    Filesize

    4KB

  • memory/2488-9-0x00000000745E0000-0x0000000074D91000-memory.dmp

    Filesize

    7.7MB