Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 03:09
Static task
static1
Behavioral task
behavioral1
Sample
bd3db35de8078184822ca8742025e6742deed410880360fd1361ec0ddc339067.exe
Resource
win7-20240903-en
General
-
Target
bd3db35de8078184822ca8742025e6742deed410880360fd1361ec0ddc339067.exe
-
Size
2.8MB
-
MD5
44f43f42c9ea788b936ec3b5da2e3ad6
-
SHA1
5ae43b8c14aa9f1b9c1e123e3343de37bff60523
-
SHA256
bd3db35de8078184822ca8742025e6742deed410880360fd1361ec0ddc339067
-
SHA512
8f0efd96a0ecda7ddd683520d4005b7ddea427b1dc104fec044812b1289f398b86d889dd901341ee97fcc605b14174fe29793f713e9ee2ab839eca15cff88bda
-
SSDEEP
24576:gKncCmoImiJ7un1SdudwaXwQ9gGo7GiaeY8i1ZXD1Fcb6DXqM6DV+QVJHcuQ5p3j:nnfZ2aXl2GoaPeY8Mjv69hF65VB
Malware Config
Extracted
asyncrat
0.5.8
Default
104.236.39.42:6606
104.236.39.42:7707
104.236.39.42:8808
NLzwJdZ9VJQw
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 2 IoCs
resource yara_rule behavioral1/memory/2336-3-0x0000000000580000-0x0000000000592000-memory.dmp family_asyncrat behavioral1/memory/2336-4-0x0000000000580000-0x0000000000592000-memory.dmp family_asyncrat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd3db35de8078184822ca8742025e6742deed410880360fd1361ec0ddc339067.exe