Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 03:18
Behavioral task
behavioral1
Sample
1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
120 seconds
General
-
Target
1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe
-
Size
63KB
-
MD5
de61717e23ca015e28d453174270fbe0
-
SHA1
31bf7e76d51a7684f30be8b26050315aa6a2b102
-
SHA256
1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02
-
SHA512
514497c85b2e531395d0d2c3086e93b42db123a0cd007059dd98f154abb88f4826ba8b1d71b898510f04d65efb77848fa9fb0244161fd16f4afcd89bc33f19d9
-
SSDEEP
768:QvsM2sk/978SQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXJ2waKpRRKISu0dP:j1/M/dSJYUbdh9swzpnKPu0dpqKmY7
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
sigmaskibidisigma-36671.portmap.host:36671
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exedescription pid Process Token: SeDebugPrivilege 4888 1ad1d12a919bdbfeec065b1b9d70ed4f2c43f7fc4928e817b756332ef6b52b02N.exe