Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 17:02
Behavioral task
behavioral1
Sample
Exodus.exe
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Exodus.exe
-
Size
80KB
-
MD5
4f1beb3be76b26f989e9b67658745b61
-
SHA1
559883977039a3645ac8477249de226a67a46bd9
-
SHA256
68a0feabf94c619927c5f8e524043a0bb0fb9c940b905482d1fe2d8a7e1b8491
-
SHA512
ce78747dd487e6397cb7185b1eef4799c3f1c14e36c558d4de4bced9c58a6aab5eb2386a1e424e45beef66f3d3c1a8b00f0aab6e31e8d7e00f55f54d5c89a9da
-
SSDEEP
1536:2uBw1TXMo28ddxnvb27sA3Tl5dRaOd5fJefKmzl:2uBkTXMo28ddxnvb27fl5yO3hCKsl
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Exodus
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
NSe2vdRAuvxN
Attributes
-
delay
3
-
install
false
-
install_file
powerhouse.exe
-
install_folder
%Temp%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Exodus.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1596 Exodus.exe