Analysis
-
max time kernel
133s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 08:37
Behavioral task
behavioral1
Sample
6306f45ce30c8aa95083bf427f0107b981fd03eec856e6a4e156b3f7fe096174.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6306f45ce30c8aa95083bf427f0107b981fd03eec856e6a4e156b3f7fe096174.exe
-
Size
63KB
-
MD5
b48d70fa8f3198ce5f4ea54137bf9d0a
-
SHA1
20c680d3f653280dbdc1c8aa240b31ad2c97d63d
-
SHA256
6306f45ce30c8aa95083bf427f0107b981fd03eec856e6a4e156b3f7fe096174
-
SHA512
e33b0327e4d08fe7749f8835cd28df9cad80c0b7529f96468c0a1bb35f491eac085d39078cb1208260ada39d36fb4128e615009c8dfdcebeed8d67015efcc93c
-
SSDEEP
1536:Lhp5LrUwk4Xq0Wdbk6E8P7Gbbow/M6ySGpZVclNO:Lhp5LrUwk4XqdI6ljGbboeM6yXzYY
Malware Config
Extracted
Family
asyncrat
Version
1.0.7
Botnet
Default
C2
where-leads.gl.at.ply.gg:61177
where-leads.gl.at.ply.gg:7777
Mutex
DcRatMutex_qwqdanchun
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
6306f45ce30c8aa95083bf427f0107b981fd03eec856e6a4e156b3f7fe096174.exedescription pid Process Token: SeDebugPrivilege 2700 6306f45ce30c8aa95083bf427f0107b981fd03eec856e6a4e156b3f7fe096174.exe