Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 01:12
Behavioral task
behavioral1
Sample
RedTiger.exe
Resource
win7-20240704-en
windows7-x64
4 signatures
150 seconds
General
-
Target
RedTiger.exe
-
Size
74KB
-
MD5
0e45b3da133b30f9c5f6971336587768
-
SHA1
46609e9cf1848ee188ff5917f03c18bd33950d98
-
SHA256
9230c9ecad0f7bfc33da597617e421edb6ded3449db045c030a1eb0d7656294f
-
SHA512
9e0a60da503a94de7007e72fb80161760c941516ab12c4ac243dad280da5249d5aa87ad2848646b145c07102e1bc8195f11b2a2889c038ee40133d890a3f414b
-
SSDEEP
1536:KU1gcxe1eHCZWPMVr4SfSzyIrH1bi/tlGCPoQzcGLVclN:KUKcxe1ayWPMVr4SSH1bijPoQfBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
127.0.0.1:4449
Mutex
kycibynwcrxulesbiyi
Attributes
-
delay
1
-
install
false
-
install_file
test.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe 3416 RedTiger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3416 RedTiger.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3416 RedTiger.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RedTiger.exe"C:\Users\Admin\AppData\Local\Temp\RedTiger.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3416
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3364,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4632 /prefetch:81⤵PID:4208