Analysis
-
max time kernel
7s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-08-2024 06:41
Static task
static1
1 signatures
General
-
Target
Polymorphic.exe
-
Size
510KB
-
MD5
3631be95eac2fe82a72619182e485138
-
SHA1
71dec411a838a9b2566d78eaa0cdda0b4cf2f05a
-
SHA256
e54412fc4db31412e81c462acd252a203c1405d6cb951024a635fad64e33a89e
-
SHA512
4cf9ccc037f9df166628ea7d96a192c5219861a3caff29eee674de20334f6b7bb7fc7db30e4aec201fa2a4454ef4196f9d56266b5c5401a78bf16a7a80f103bf
-
SSDEEP
12288:KXLVBMoCXQBv5+2E9aoFWOFZX95+A6EeIUv1KXAC4STe:KXaMmPwOjX9ePIV
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4284-3-0x000002A015560000-0x000002A015576000-memory.dmp family_asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4284 Polymorphic.exe