Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 03:18

General

  • Target

    1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe

  • Size

    63KB

  • MD5

    de61717e23ca015e28d453174270fbe0

  • SHA1

    31bf7e76d51a7684f30be8b26050315aa6a2b102

  • SHA256

    1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02

  • SHA512

    514497c85b2e531395d0d2c3086e93b42db123a0cd007059dd98f154abb88f4826ba8b1d71b898510f04d65efb77848fa9fb0244161fd16f4afcd89bc33f19d9

  • SSDEEP

    768:QvsM2sk/978SQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXJ2waKpRRKISu0dP:j1/M/dSJYUbdh9swzpnKPu0dpqKmY7

Score
10/10

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

sigmaskibidisigma-36671.portmap.host:36671

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe
    "C:\Users\Admin\AppData\Local\Temp\1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4888

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4888-0-0x00007FFFE0C63000-0x00007FFFE0C65000-memory.dmp

    Filesize

    8KB

  • memory/4888-1-0x00000000004F0000-0x0000000000506000-memory.dmp

    Filesize

    88KB

  • memory/4888-2-0x00007FFFE0C60000-0x00007FFFE1721000-memory.dmp

    Filesize

    10.8MB

  • memory/4888-3-0x00007FFFE0C60000-0x00007FFFE1721000-memory.dmp

    Filesize

    10.8MB

  • memory/4888-4-0x00007FFFE0C63000-0x00007FFFE0C65000-memory.dmp

    Filesize

    8KB

  • memory/4888-5-0x00007FFFE0C60000-0x00007FFFE1721000-memory.dmp

    Filesize

    10.8MB