Analysis
-
max time kernel
108s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 06:57
Behavioral task
behavioral1
Sample
15c3f0f609d21410c3ee4e1ac089eb5b06505bcc86178205691bdd05b1439e61N.exe
Resource
win7-20241010-en
General
-
Target
15c3f0f609d21410c3ee4e1ac089eb5b06505bcc86178205691bdd05b1439e61N.exe
-
Size
47KB
-
MD5
0161faa2e5aee975ebf531ba322177d0
-
SHA1
f721c8b1408dd77426dc37079e42a1bf1c4095e9
-
SHA256
15c3f0f609d21410c3ee4e1ac089eb5b06505bcc86178205691bdd05b1439e61
-
SHA512
6bc58f57e025ffae9b6fb38ebdeeec209409affc6821c8012b6b14d1caa17a529abac7ab4ef001ec0355dbee11d2865bde9b10fe0d28c8795f7b42a64047674a
-
SSDEEP
768:mu/6ZTgoiziWUUd9rmo2qrXjpXMtiSW5XYWGIG0bmnHYeV5tIUhosUVcDZNf+:mu/6ZTglB2a+ti95oqbmHjOUd9dNf+
Malware Config
Extracted
asyncrat
0.5.7B
2.tcp.eu.ngrok.io:1567
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 2.tcp.eu.ngrok.io 42 2.tcp.eu.ngrok.io -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15c3f0f609d21410c3ee4e1ac089eb5b06505bcc86178205691bdd05b1439e61N.exe