Analysis
-
max time kernel
1195s -
max time network
1202s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 15:09
Behavioral task
behavioral1
Sample
Melonloaderinstaller.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
300 seconds
General
-
Target
Melonloaderinstaller.exe
-
Size
85KB
-
MD5
fa71ad818f4acd9a353b3768c34277c5
-
SHA1
c7a4c2137287549dfd90f228ddc8bf3c3e61ab28
-
SHA256
2ab61dcd70dd811228e99b3d7ff0d7579593e273c4f5e292707c48c5d52efe67
-
SHA512
91c7e8ed90ecdb8713a89e99789fac2cf2abb1e56e18aa491cf3dd49af76a6cd488a0bd9c32a2b6edea72666297012adfeb65806788b5dc5f1bca93707a52cea
-
SSDEEP
1536:nu/6ZTgle2Dw3zr+7baSo8VL552GMXYdsQScFY/YQULA+wgvbx:nu/iTgle2kjr+7baSXL5nrzio7Rx
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
FDK
C2
ny-case.gl.at.ply.gg:60515
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Melonloaderinstaller.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Melonloaderinstaller.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Melonloaderinstaller.exedescription pid process Token: SeDebugPrivilege 4724 Melonloaderinstaller.exe Token: SeDebugPrivilege 4724 Melonloaderinstaller.exe