Analysis
-
max time kernel
143s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 05:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe
-
Size
1.9MB
-
MD5
013967733e82a4ad95ad1bfbfb59db17
-
SHA1
2050adb47d1fb64531954b4b0e8b5c394ecaf2ab
-
SHA256
adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c
-
SHA512
a7ff17bcde354cdddd18c0192d15b779a2967a873f1a47716e82934abeeb52c3ac8de7caca127fa6a160a10b48439f51008d5bdf392b3ee559c6d7253ba78b8d
-
SSDEEP
24576:DRrpe5fBVyjX6rdRmNjhTl1qyhOrJR0er8JsU3Aot+Ec0xMkWd0MzVsKiF:drpe5fKX6rd4hBk5rJRNd0MzVsKiF
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
127.0.0.1:8848
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4020-2-0x0000000000890000-0x00000000008A6000-memory.dmp family_asyncrat behavioral2/memory/4020-3-0x0000000000890000-0x00000000008A6000-memory.dmp family_asyncrat -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4020 adb6695538c74d2742c8a6ea52a263fadbdfc6eb16dfac52639bcbfac8b2183c.exe