Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-08-2024 12:44
Behavioral task
behavioral1
Sample
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
-
Size
64KB
-
MD5
b5869ca2bc01b3f51ee0ec4d2cdf8925
-
SHA1
af1382af0c1f1f64e07d744487f3205d17fddf96
-
SHA256
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3
-
SHA512
6ab6b25427b82e0275baea545bc4ea800d5dcab0a0f21eea809b418c4c2e71708885ad1c91cd2659ea67bfffeb3420b5cc47e2bc1a2c9f005f2754c362e5073d
-
SSDEEP
1536:zQ9KoccuIkQKHHUN26blwl8UtinZVclN:zGKocrIk5nE26blY8RzY
Malware Config
Extracted
Family
asyncrat
Version
WinRat [beta]
Botnet
crypt
Mutex
123423543
Attributes
-
c2_url_file
https://raw.githubusercontent.com/valp3r/TestNoSocket/main/589734gfmngr09e.bin
-
delay
1
-
install
false
-
install_file
UnityLisency.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exedescription pid process Token: SeDebugPrivilege 4784 141dbd540ae2a9a07dba2c3e1508cdd5bfbdf44ec4fecac7ea69b4d48b7c0db3.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4784-0-0x000001B1B88B0000-0x000001B1B88C6000-memory.dmpFilesize
88KB
-
memory/4784-1-0x00007FFE91E53000-0x00007FFE91E55000-memory.dmpFilesize
8KB
-
memory/4784-2-0x00007FFE91E50000-0x00007FFE92911000-memory.dmpFilesize
10.8MB
-
memory/4784-3-0x00007FFE91E50000-0x00007FFE92911000-memory.dmpFilesize
10.8MB
-
memory/4784-4-0x00007FFE91E50000-0x00007FFE92911000-memory.dmpFilesize
10.8MB