Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 05:03
Behavioral task
behavioral1
Sample
2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa.exe
Resource
win7-20240729-en
windows7-x64
2 signatures
150 seconds
General
-
Target
2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa.exe
-
Size
47KB
-
MD5
3fb871e12cee36470aa80d019aa46c2a
-
SHA1
3fff365af65a3d3312c222acfe0a4d7447d0e78d
-
SHA256
2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa
-
SHA512
736208f58515d91cf27ea55c6a76634ec600c2eace2610b5fdac13ec13a37bb20153b2591cf339107d648ab75a9c2320519b2df77c66dd686879accc06f4f985
-
SSDEEP
768:gq+s3pUtDILNCCa+DiyiVioP8YbdgemEidkQJ+68vEgK/JHZVc6KN:gq+AGtQO/rzbK7ndkQJd8nkJHZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Server
C2
dcmxz.duckdns.org:35650
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa.exedescription pid process Token: SeDebugPrivilege 4844 2e432426a7a0a10a0068c035368f749c298e1ef1add61e31a8b25da74676fcaa.exe