Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 06:58
Behavioral task
behavioral1
Sample
build0.exe
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
build0.exe
-
Size
45KB
-
MD5
6a9577723bb3badc80ca7a54c9804699
-
SHA1
01bf0e3df1c1bc1c5af6fd010f85f0c43c1377f8
-
SHA256
7ec1b6071152fbeb49d4d5542a9d12df69bb5590c864c263847b7d7b8e8ba7b4
-
SHA512
561511516b9ec118e5dd52d576096e501f3652633b54f07da02637d608f944959b0492e1e6c87df9939d50353939c99905ec111205ae4d5bfa7c18a550e59fa5
-
SSDEEP
768:uu/dRTUo0HQbWUnmjSmo2qMnCXtTtoPIKzjbogX3iWCN/BGfRgApBDZax:uu/dRTUPE2Dw3K3b/XSWCafR3dax
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
8Lyp08vgvo79
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
build0.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language build0.exe