Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 12:59
Behavioral task
behavioral1
Sample
cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b.exe
-
Size
47KB
-
MD5
a5ecad34cb793dbb9c03a601093e1c96
-
SHA1
6cebe7561b40cc11e15629ef7a3df55f3f411cbb
-
SHA256
cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b
-
SHA512
612278e99c4bf570756f3511d60ecd8c46654aededc07419779786814cc09d1fc5bb7d51c0c3210d7ac7be84bf47b1a3e0931a2075afb64348f193c063ae62fb
-
SSDEEP
768:xGq+s3pUtDILNCCa+Di+0j1rgLqRp8Aofiw8Yblge5s69OhtvEgK/JLZVc6KN:8q+AGtQO+OOPAmzbiws69ynkJLZVclN
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Server
C2
dckazts.duckdns.org:35650
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b.exedescription pid process Token: SeDebugPrivilege 2232 cdbd60dbcef6cb4aab7fc1094547a3f16500c0c70032b30faacd6df5a5b0199b.exe