Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-11-2024 20:22
Behavioral task
behavioral1
Sample
7eab454644878bc7385dd652f67344bf4a7f46535d3da0b6d3b7a3770284e97e.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
7eab454644878bc7385dd652f67344bf4a7f46535d3da0b6d3b7a3770284e97e.exe
-
Size
47KB
-
MD5
9c86b82488649e094188664917c97866
-
SHA1
f73b96a2305f0228bb38ed7d0a6f180f9aee5195
-
SHA256
7eab454644878bc7385dd652f67344bf4a7f46535d3da0b6d3b7a3770284e97e
-
SHA512
3464b8a2761ef85d41ecf15d00099623d2e75dfa3514ca317001b31d5be8997bf1fc5a53cc4b3f6749a3d2789e4961373c680cc7d55a74a3ed48415c7df482f9
-
SSDEEP
768:xGq+s3pUtDILNCCa+DiZLFxh63BOi78YbKge77eq5vEgK/JLZVc6KN:8q+AGtQOZRxk7zbd83nkJLZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Tar2
C2
sremc.duckdns.org:8000
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
7eab454644878bc7385dd652f67344bf4a7f46535d3da0b6d3b7a3770284e97e.exedescription pid process Token: SeDebugPrivilege 2856 7eab454644878bc7385dd652f67344bf4a7f46535d3da0b6d3b7a3770284e97e.exe