Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 08:22

General

  • Target

    6d1dab1d4a945580617f762b3c23a6b0N.exe

  • Size

    63KB

  • MD5

    6d1dab1d4a945580617f762b3c23a6b0

  • SHA1

    28d17e16d274687851892790a0e3b8dbdd3c1372

  • SHA256

    689733b311d3c8412e007386a5d88e50a566ed2d5b2df97d0fc4aa7cfd562384

  • SHA512

    fe84ba4ab3352118dcfb9b863b246b8d60ac8218f7c96e584f3877858fd6fd173211883dcff66f8347df00cf6e99e9afa41ebf5c1ff87abe4c6a33a7ce49aaf1

  • SSDEEP

    1536:AhthBLTRQUhZ4DcVdReeiIVrGbbXwyTQeZvGGDpqKmY7:AhthBLTRQUhZ4idUeXGbbXjTQIHgz

Malware Config

Extracted

Family

asyncrat

Version

5.0.5

Botnet

Venom Clients

C2

91.92.242.59:4449

Mutex

jemhrguergmuju388mug

Attributes
  • delay

    1

  • install

    true

  • install_file

    Lol.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Suspicious use of AdjustPrivilegeToken 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1dab1d4a945580617f762b3c23a6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6d1dab1d4a945580617f762b3c23a6b0N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1520

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1520-0-0x000007FEF5EA3000-0x000007FEF5EA4000-memory.dmp

    Filesize

    4KB

  • memory/1520-1-0x0000000000C60000-0x0000000000C76000-memory.dmp

    Filesize

    88KB

  • memory/1520-2-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

    Filesize

    9.9MB

  • memory/1520-3-0x000007FEF5EA0000-0x000007FEF688C000-memory.dmp

    Filesize

    9.9MB