Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 10:30
Behavioral task
behavioral1
Sample
TCP.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
TCP.exe
-
Size
45KB
-
MD5
f127aef5829703426ff8399a76c1852c
-
SHA1
17e72d081ceb20119abe7bef8c640d5db48276f6
-
SHA256
6907ab3a0f4e69bf6dcb8c03a18bd8402afa701ade8863a0e15808614ffb1b17
-
SHA512
c3125920567b59119b86e284ed96c3860b1998f9d6b6078b5c2a18aa6b4c56274124fd2f77710bbbf972a6387ef20cb4a5d19c96be2131fb02f6d5692c2384c0
-
SSDEEP
768:ouGYlTHkqamWUAqncmo2qjGMyGJAQGQPPIbyjbRgX3izngHqX4a1Y59/BtBDZ1h:ouGYlTH1i2RxVJbebeXScHqX4mC3d1h
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
14.243.221.170:3322
Mutex
ynBzTukwLg8N
Attributes
-
delay
3
-
install
false
-
install_file
Clean.bat
-
install_folder
%Temp%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TCP.exe