Analysis

  • max time kernel
    238s
  • max time network
    210s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    09/11/2024, 12:58

General

  • Target

    https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/releases/tag/v0.5.8

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

Fo8wclkxMXUk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/NYAN-x-CAT/AsyncRAT-C-Sharp/releases/tag/v0.5.8
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffd9ebd46f8,0x7ffd9ebd4708,0x7ffd9ebd4718
      2⤵
        PID:2088
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
        2⤵
          PID:3468
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3516
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:8
          2⤵
            PID:5108
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
            2⤵
              PID:3244
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:1
              2⤵
                PID:4240
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:8
                2⤵
                  PID:1560
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:3520
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x2e8,0x2ec,0x2f0,0x2c4,0x2f4,0x7ff6b70d5460,0x7ff6b70d5470,0x7ff6b70d5480
                    3⤵
                      PID:5088
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5716 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3268
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5844 /prefetch:8
                    2⤵
                      PID:4904
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:1
                      2⤵
                        PID:3988
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2168,1851793419368997889,6147980577504742458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6512 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1976
                    • C:\Windows\System32\CompPkgSrv.exe
                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                      1⤵
                        PID:3004
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:744
                        • C:\Windows\System32\rundll32.exe
                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                          1⤵
                            PID:5220
                          • C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe
                            "C:\Users\Admin\Desktop\AsyncRAT\AsyncRAT.exe"
                            1⤵
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:5224
                          • C:\Windows\system32\wbem\WmiApSrv.exe
                            C:\Windows\system32\wbem\WmiApSrv.exe
                            1⤵
                              PID:3112
                            • C:\Users\Admin\Desktop\AsyncClient.exe
                              "C:\Users\Admin\Desktop\AsyncClient.exe"
                              1⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3712

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              843402bd30bd238629acedf42a0dcb51

                              SHA1

                              050e6aa6f2c5b862c224e5852cdfb84db9a79bbc

                              SHA256

                              692f41363d887f712ab0862a8c317e4b62ba6a0294b238ea8c1ad4ac0fbcda7a

                              SHA512

                              977ec0f2943ad3adb9cff7e964d73f3dadc53283329248994f8c6246dfafbf2af3b25818c54f94cc73cd99f01888e84254d5435e28961db40bccbbf24e966167

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              557df060b24d910f788843324c70707a

                              SHA1

                              e5d15be40f23484b3d9b77c19658adcb6e1da45c

                              SHA256

                              83cb7d7b4f4a9b084202fef8723df5c5b78f2af1a60e5a4c25a8ed407b5bf53b

                              SHA512

                              78df1a48eed7d2d297aa87b41540d64a94f5aa356b9fc5c97b32ab4d58a8bc3ba02ce829aed27d693f7ab01d31d5f2052c3ebf0129f27dd164416ea65edc911c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              48B

                              MD5

                              af41dc135259691d5a0da6b97d958c69

                              SHA1

                              fa2dcdd48d479033dd866b42a582887ab4ba6ed4

                              SHA256

                              991c1b098ff21747b3322f42b5ac4035e58e533cfa47364f6c13c6a9e56d4ad1

                              SHA512

                              dd3431fb79f8ef17cfa4c07270108b7233f0fe0c48d66bbffe4f33808fdd7415ac6e22e8a35b8e4733da908528c2d2dd0ce5012321b1a25a021d7a2c135674c7

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              1KB

                              MD5

                              b6c0849a7fcee7a60991f7a47b7af764

                              SHA1

                              93364f6fe1b41da57a424d1887840b238822e101

                              SHA256

                              c1910dbd88fe3d583d600f1979b5d8fe7325d7d05dc778b6a98eaa0c95ee0263

                              SHA512

                              274e5b2276412be589a3281fb402c62756401cbc5204417464fc651a996a06d32818fe8ccad02daf465964e3a3294fd76f81b17c14d59af0bfd55873ec6ce138

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                              Filesize

                              70KB

                              MD5

                              e5e3377341056643b0494b6842c0b544

                              SHA1

                              d53fd8e256ec9d5cef8ef5387872e544a2df9108

                              SHA256

                              e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                              SHA512

                              83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

                              Filesize

                              264KB

                              MD5

                              f50f89a0a91564d0b8a211f8921aa7de

                              SHA1

                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                              SHA256

                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                              SHA512

                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              285252a2f6327d41eab203dc2f402c67

                              SHA1

                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                              SHA256

                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                              SHA512

                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              496B

                              MD5

                              1b92794633aaa7d8ca83e408ef516a36

                              SHA1

                              4ae0678d6cf8abedb3e9819fc9d7d715d3f72bb6

                              SHA256

                              0ff76dc871bd6e59abe386781ef988b4c8d734bca726a4d1eb556d3d78f1e7e0

                              SHA512

                              698bb4adf1932dd48fbffb344b0053b9dc753b97a92d88a26341e0c3b0fa2e03481c5193bd2b4a1caaa2aa2f00e41eae73c53aaadc1ac6bb8be17d0f229a61bb

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              766a3587fcd093fdafa86b5ddfc23036

                              SHA1

                              1bfe2a22e5d11d3d305b97cf46532fe6c90de8d2

                              SHA256

                              4c52f1f9bbc2e2f6fe2d0c3099d3d4a07d1cd8d35964939f1d81dfefca1ee43e

                              SHA512

                              cc2621d8cafc7cf3d6b63944fad3b8a389594f85ca4ca4b5b46376ddeb2ed32c15b61992a98c058f7ecdd11f6bf298e4bd50cdf892aaaac2418a54a4b55ab47a

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              3a01b9df12f95860ceaf3589e94a5929

                              SHA1

                              c199228fa3248a19ba1b0b220253ea1e43ca09bb

                              SHA256

                              9f8394245fc4415b9cd2aa9171f555df620e01fc0c7e33bd06d6ffa29669df5d

                              SHA512

                              04bd0103bb3acd8da32a614b27862b6df762b2329c56b3092244f5ac2a8f805de5f717120f310bb871e28624fd307d466975dbd1e6bfc345dab324eeda4c6bbb

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              74d9eb5260fef5b115bec73a0af9ac54

                              SHA1

                              18862574f0044f4591a2c3cf156db8f237787acf

                              SHA256

                              7d7e7b38664d625a0bbffbcb7882b175709e92987bf9da113c4745fafbbc361d

                              SHA512

                              b85917201b1d4b4542a4424ce40ddd083ddbd0e230e1931fe6f7cdd2aa3d8a0eec8daa743ddc5467f0a92da5594144c602081d941b216ca9cafdfd3c150d32d2

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              952a6e3cbc50f011cf2f04c9470080ff

                              SHA1

                              a0d6a2509af73e523c970f6e4351861bde63d6db

                              SHA256

                              faa79ba7dfd140106187ab50f14aa7cca13650f94f796419bc0a44d7a2b79d5f

                              SHA512

                              7955092a6086f05268e4b0f88648d9275020b6cad83f81c90eac5a7cd994cc243b8dfab579d4335db62f3577fd2d8a7fbefcad6cc615e2bcf1d014115056cde4

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage\MANIFEST-000001

                              Filesize

                              41B

                              MD5

                              5af87dfd673ba2115e2fcf5cfdb727ab

                              SHA1

                              d5b5bbf396dc291274584ef71f444f420b6056f1

                              SHA256

                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                              SHA512

                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                              Filesize

                              874B

                              MD5

                              69075fd3f220181670ec61b675acae86

                              SHA1

                              ec0d78655f84b4e27269b05aa2c0dd0f37d6fdd6

                              SHA256

                              146b80a32e378c63b81c60be12e6a990bd3606c0f6cf0084913cd6caa2e765c4

                              SHA512

                              331444e248939a70d81aa44c95bfdf12e3b45dc9b1585164b183407d7319ed6223c893bfe8ca65309fdd06c82eda0747f008970b490217e53f44ec6954597ced

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ee96.TMP

                              Filesize

                              874B

                              MD5

                              bd45efab69f49656b8e18f2d4358b3e7

                              SHA1

                              f8693f01c0b8548ea9b343be548bd511ab7d996f

                              SHA256

                              51d351ddb3edfa6d8e5fac1d47a1c12d613ca1f796eec2aa1d9483ed01c44e2c

                              SHA512

                              864459cc494c6fa52492149b8033ead0e099a0a79b4f5136b2432545075a62a0fdc5ece4ccfe01eb59452a355ce19f3a8afa4e9340b9c48f4af647fd7c88dc98

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b939648e-4499-420e-972f-a060c36546f1.tmp

                              Filesize

                              5KB

                              MD5

                              03a495ca13e762cd2d3020f789c15320

                              SHA1

                              2975f669d4b90ea7e6dba18e715100c3eb26b620

                              SHA256

                              0c1efa1ec202b2362ceff628af849f79ec10090b158c34d9c44b30fe71d13fba

                              SHA512

                              593fe85653d8cd46a86c9d608d2f56332931bfb7775bdf24cc58bdfa79ee51ebfbb3e8be1a7a001f5f44f9ecab72268b1f69be1817d90dc0e244beceebd737f2

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              206702161f94c5cd39fadd03f4014d98

                              SHA1

                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                              SHA256

                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                              SHA512

                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              8KB

                              MD5

                              66d953c61b9e9fa8ef8d1441c0662b35

                              SHA1

                              005d6c4a8a99294c6d046d010e96701dda210503

                              SHA256

                              0f436fb2559174281f2ef05bfd94396207c0cdcf6a1f550075c127245e001136

                              SHA512

                              1c91b465521877ee8ea9c17c0ff48377a66529f945173803f55d44f50d13d2a1c412f2f34da5359a971d8ea4afac9476684f69100edea1bcf670292783148cd9

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              10KB

                              MD5

                              34900c7319e2f98e9a8144b770599b18

                              SHA1

                              db4916d322b8b6d2f1cfe6932c6849a3a9153349

                              SHA256

                              aa65a2eff244e381fbfafa6934f63019576d81055df3ddbe65b7e0f5e14144da

                              SHA512

                              5a857340bcd5270d920b8960bfe8e4c7102cff7e0c6f818dde9c3753b707db1264ada47fbd9d67cac9216169a69968b75f1eb4c225c03cf498817d8946758528

                            • C:\Users\Admin\AppData\Local\Server\AsyncRAT.exe_Url_id0rl34oxreuuoxkuh1icsh0qae0uc4o\0.5.8.0\user.config

                              Filesize

                              319B

                              MD5

                              f71f55112253acc1ef2ecd0a61935970

                              SHA1

                              faa9d50656e386e460278d31b1d9247fdd947bb7

                              SHA256

                              d1ad588a08c8c0799d7a14509f1e0a7ae04c519102ed9d328a83fe65999e6179

                              SHA512

                              761b5c13e39bd4ae21d298084bbe747ae71c383fedf9a51fd5e9723a8b3b4547de459d82bac7f3f8f3bfc11cfb0528a4f1057b51996d7d046583109a53317b44

                            • C:\Users\Admin\AppData\Local\Server\AsyncRAT.exe_Url_id0rl34oxreuuoxkuh1icsh0qae0uc4o\0.5.8.0\user.config

                              Filesize

                              565B

                              MD5

                              5b39bc6153c8f64711542c6c8f4d7112

                              SHA1

                              83cd751f0a2852475641e9d63f20fd157754c1b5

                              SHA256

                              4d6f3289f65de8898a7e46ed14892c004a5c6e467ffe587bb2ae0b30986e7adf

                              SHA512

                              c0bea499a1e5ba52606c0a04619de05385583424c587129d65534c50c01820c4aaf537be5c03af7cb24698cde26768968d60455908f89f2d1d758eedb844395e

                            • C:\Users\Admin\AppData\Local\Temp\tmpCD06.tmp.bmp

                              Filesize

                              478KB

                              MD5

                              a2cd25d8866212e00b2ef1abe13d407c

                              SHA1

                              8e2d66b6ac9deac297336078f94f0ce0b5816a83

                              SHA256

                              8fdeef7869328de870ef83bcf11b0dd06be2173bde16f5eacfef43769102dfad

                              SHA512

                              7f9e9dc56bf3c1fa1df559504c5e7c915c00cdc15bafb681f2659ee350b78e59008d4e53349e9d937c522a4881ac9ccbcf64ab1e00af9e9128cfd5be3d561f93

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                              Filesize

                              3KB

                              MD5

                              19bb5dd302136da28ce6aca0ff3b3657

                              SHA1

                              0b004e0061b7556b278d39ef1610151b19a3440e

                              SHA256

                              2747edcdd974c54d3f6105b9845334db534995f2eefdbb470360e79e3787f56d

                              SHA512

                              342652b01e0c9f35c40579b9a2746545e0c13d60ccca4e256331e201a4d79ac1ea9ec6bb6ce09d78d7ce530e005c02ec484bd47404a439e39eb9e8c19353cad6

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                              Filesize

                              3KB

                              MD5

                              aa4bd552499bf8f2a386d2ddfe9d9422

                              SHA1

                              b13574490946a16858f582c263dfea937230ae54

                              SHA256

                              2011ec6cc654b443e9525fb99cab1a71708ea659b8d64b40cfdb8fdd21df81b5

                              SHA512

                              e5f4a9b4255280bfeb9d5af02c7eeb8074d05f01a42c431df30ff23ada4057160d43165beba8c2eab3ff9d65af16f2107c42068db1d575398195878e78097556

                            • C:\Users\Admin\Desktop\AsyncClient.exe

                              Filesize

                              47KB

                              MD5

                              40133e536737141737f295885787ac84

                              SHA1

                              8b792e46664b0df25b2525c75a1c151758c24298

                              SHA256

                              6232236d3208acb35b622c45cf3d62623ea891173c0af3b143da8662df51d407

                              SHA512

                              40d5b866ae15a5b96c217922f473a95eb2d5d6905533e84eb09a1a9e3b1c9a80ace91b1457d3801e05732d03051b89aa9e56e5f6e5f599fb62504a4b00cb71a5

                            • C:\Users\Admin\Desktop\AsyncRAT\ServerCertificate.p12

                              Filesize

                              4KB

                              MD5

                              b0de4c6311f548a9ac5d0463c55319c6

                              SHA1

                              6e54c1ae148c34c2b37fec8bdd5d999b83916169

                              SHA256

                              d6fcd18f463f2eb0c65ad6e55aeeb04788ec15d28df4525221fc611e45308f23

                              SHA512

                              f1203ba0fc11a16bca4de8799aecc62d6f268cc22809081847f677db9cb3cffd39e9dfa4d3cfc5738e870869d7f5b0e2202dbc2d1d263fd5c3c6005f605dd1fe

                            • C:\Users\Admin\Downloads\Unconfirmed 516335.crdownload

                              Filesize

                              6.9MB

                              MD5

                              30b1961a9b56972841a3806e716531d7

                              SHA1

                              63c6880d936a60fefc43a51715036c93265a4ae5

                              SHA256

                              0b29711ec115c27f4cd6963b9ea1e4febf15624f1c17d1c018611ee3df8c333c

                              SHA512

                              9449065743226bd15699e710b2bab2a5bb44866f2d9a8bd1b3529b7c53d68e5ecba935e36406d1b69e1fb050f50e3321ef91bc61faac9790f6209fec6f930ed0

                            • memory/3712-488-0x0000000000510000-0x0000000000522000-memory.dmp

                              Filesize

                              72KB

                            • memory/3712-495-0x0000000006470000-0x00000000064D8000-memory.dmp

                              Filesize

                              416KB

                            • memory/3712-500-0x0000000006F90000-0x0000000006FF4000-memory.dmp

                              Filesize

                              400KB

                            • memory/3712-498-0x0000000006BF0000-0x0000000006C50000-memory.dmp

                              Filesize

                              384KB

                            • memory/3712-497-0x0000000006980000-0x0000000006A12000-memory.dmp

                              Filesize

                              584KB

                            • memory/3712-496-0x00000000065D0000-0x00000000065EE000-memory.dmp

                              Filesize

                              120KB

                            • memory/3712-491-0x00000000052F0000-0x000000000538C000-memory.dmp

                              Filesize

                              624KB

                            • memory/3712-492-0x0000000005940000-0x0000000005EE6000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/3712-493-0x0000000005390000-0x00000000053F6000-memory.dmp

                              Filesize

                              408KB

                            • memory/3712-494-0x00000000064F0000-0x0000000006566000-memory.dmp

                              Filesize

                              472KB

                            • memory/5224-455-0x000001FABF8F0000-0x000001FABFA16000-memory.dmp

                              Filesize

                              1.1MB

                            • memory/5224-443-0x000001FABEEB0000-0x000001FABEEBA000-memory.dmp

                              Filesize

                              40KB

                            • memory/5224-445-0x000001FAC2B00000-0x000001FAC2D80000-memory.dmp

                              Filesize

                              2.5MB

                            • memory/5224-439-0x000001FAA3C70000-0x000001FAA42DA000-memory.dmp

                              Filesize

                              6.4MB

                            • memory/5224-441-0x000001FABEA80000-0x000001FABECD2000-memory.dmp

                              Filesize

                              2.3MB

                            • memory/5224-444-0x000001FABEE70000-0x000001FABEE82000-memory.dmp

                              Filesize

                              72KB