Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
19-12-2024 15:08
General
-
Target
dcrat_unpacked.exe
-
Size
45KB
-
MD5
e117553fe1437eb1b7ed26cb5c52ebde
-
SHA1
bf423ada45d9799aa3fedbd34b88f0b31f12d0d5
-
SHA256
ed2c4427f87970280cd8584c83a0d07e0864147ee84a9cbf8bdf0cdcdd89a784
-
SHA512
49fee9a6f90d0505dde2e96b57d60564cc2caed8050811dbfa9ed457d8fa2f051318eedc38ad175b1c411ac9c200dc0bc3abf87521b6617579625109272f9df1
-
SSDEEP
768:2uQMPToSkHbiWUULCimo2qBgKjPGaG6PIyzjbFgX3i5QTSlFm1iF8kf9xBDZCx:2uQMPT3Ux2nKTkDy3bCXSSKm1eJdCx
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2024
Mutex
O9LBjA4PbF1Z
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcrat_unpacked.exe