Analysis
-
max time kernel
50s -
max time network
51s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-11-2024 19:29
General
-
Target
Impulse.exe
-
Size
47KB
-
MD5
e0a7d70648d15d5ac4867aa5e65ab627
-
SHA1
84233c89885835d2d8d7e8ed1a745c25f89d3174
-
SHA256
cabddaddf3ff6434382b67399e2b506cbd7a72760ea3e4c68258ad0a08569aaa
-
SHA512
f2f85b1d3678bd5b8e6d1da0a0c8c3d8094d0d9d53da30e726155512daef2db0939acdbf0cb9690447eb2e98590231e10143bb879535ab60ac0ec6d27d54511f
-
SSDEEP
768:EuPfZTg4pYiWUU9jjmo2qr6tWbc1Qoi2hPIMGo/sL0bpta3i+fNMDGfj7mL65u5+:EuPfZTgKa2Lc262+zo/sAbiy+Vd7zgTC
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
Juju123-62549.portmap.host:62549
Mutex
enz6jNsxVWkX
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Impulse.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Impulse.exe