Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe
-
Size
1.9MB
-
MD5
013967733e82a4ad95ad1bfbfb59db17
-
SHA1
2050adb47d1fb64531954b4b0e8b5c394ecaf2ab
-
SHA256
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c
-
SHA512
a7ff17bcde354cdddd18c0192d15b779a2967a873f1a47716e82934abeeb52c3ac8de7caca127fa6a160a10b48439f51008d5bdf392b3ee559c6d7253ba78b8d
-
SSDEEP
24576:DRrpe5fBVyjX6rdRmNjhTl1qyhOrJR0er8JsU3Aot+Ec0xMkWd0MzVsKiF:drpe5fKX6rd4hBk5rJRNd0MzVsKiF
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2888-2-0x00000000003F0000-0x0000000000406000-memory.dmp family_asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe