Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 20:20
Behavioral task
behavioral1
Sample
sfdsf.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
sfdsf.exe
-
Size
74KB
-
MD5
f35bf97f7d7ee8f4f536fec169420862
-
SHA1
2f5fe4a2099b062a1ab535ba6ecf6aba702c53ed
-
SHA256
29ed73cb6946c1cd83373d509be5e07c10a13d02be93a2cac6883da91da0487e
-
SHA512
21237c943419e6350294ab3fbfbd59999a5380f2e088998a36c8b4189b9f1add6e478cecea9cca2f6e2d7c2c152c39b78ca7e3d97ab2124979fb4aea2ab84995
-
SSDEEP
1536:aUhQcx/5z/CMfPMVkrsJYKItH1bg/gFRPdQzc+LVclN:aUOcx/5bHfPMVWT5H1bgoDPdQXBY
Malware Config
Extracted
Family
asyncrat
Version
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Botnet
Default
C2
193.161.193.99:1194
Mutex
bkyazmbfokxc
Attributes
-
delay
1
-
install
false
-
install_file
memees
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
sfdsf.exepid process 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe 2996 sfdsf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
sfdsf.exedescription pid process Token: SeDebugPrivilege 2996 sfdsf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
sfdsf.exepid process 2996 sfdsf.exe