Analysis
-
max time kernel
4s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 03:34
Static task
static1
1 signatures
General
-
Target
Polymorphic.exe
-
Size
261KB
-
MD5
9278aa2a3c4c9e483bf4f59f3e65a0a8
-
SHA1
860c0beea91113d20a57bb1b9147376565dc261b
-
SHA256
5c710e344c1fd45c2a68f3d9621306de0ea88f931baff33e99665559034b3b2e
-
SHA512
c1c41366cf93577eb948097f7166e99e651f8fb17b48a5ee937d25ef8d2a5cf6a89d50e7fa06c0cfff2d58c54878a35cddb51b954b79b11a8d56b7a9f2e4afad
-
SSDEEP
6144:rO8OUq4iAj56jjTHy8vRA6TQhoIU3/IN/3gKXAs/cmTP:rvV6TSqA6EeIUv1KXAC
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2012-4-0x00000152E69E0000-0x00000152E69F6000-memory.dmp family_asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 Polymorphic.exe