General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1304395568453517343/1304536571852357642/d419d5f6c043b027.exe?ex=672fbfdb&is=672e6e5b&hm=e76dbb9226fdb0e40bdbec1422f471e50f383af98ada3c2db1ebb7f2ac9214fe&
Resource
win10v2004-20241007-en
windows10-2004-x64
20 signatures
1800 seconds
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
45.141.215.18:6606
Mutex
3kcW0vTGLmp6
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://cdn.discordapp.com/attachments/1304395568453517343/1304536571852357642/d419d5f6c043b027.exe?ex=672fbfdb&is=672e6e5b&hm=e76dbb9226fdb0e40bdbec1422f471e50f383af98ada3c2db1ebb7f2ac9214fe&
-
Asyncrat family
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-