Analysis

  • max time kernel
    134s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 17:26

General

  • Target

    6e224ea9bdd50b477fe7056a320e8f5b98d27d056c825c7fbab69c8cbce02ea5.exe

  • Size

    292KB

  • MD5

    cb6cb6afe0c4e90fa030632ec35adee4

  • SHA1

    72b0ad019db3e0def6ea744bf2c5aee626e52f78

  • SHA256

    6e224ea9bdd50b477fe7056a320e8f5b98d27d056c825c7fbab69c8cbce02ea5

  • SHA512

    1d4c075fbaf3c3312d8a7e2d96fed52a7f5b2b27d66166125de4bc77f6d24e36e38b3b8522b9e2532e49ebc62d5aa3d4b1d7012276cd2ae5ad956c17fe0a6098

  • SSDEEP

    6144:Mlbzb9u1cHygDDT1MR3FybvUby5u0yGhPECUTdEkPgyl6CFdmLBHHH0BoGVKqm3o:MlbQ1c7MVSGYt58oGMqclXz6

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

PSX INFECTED

C2

206.189.139.209:2022

Mutex

PSXkjsmau

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e224ea9bdd50b477fe7056a320e8f5b98d27d056c825c7fbab69c8cbce02ea5.exe
    "C:\Users\Admin\AppData\Local\Temp\6e224ea9bdd50b477fe7056a320e8f5b98d27d056c825c7fbab69c8cbce02ea5.exe"
    1⤵
      PID:2772

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2772-0-0x000007FEF5583000-0x000007FEF5584000-memory.dmp

      Filesize

      4KB

    • memory/2772-1-0x0000000000FD0000-0x000000000101E000-memory.dmp

      Filesize

      312KB

    • memory/2772-2-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

      Filesize

      9.9MB

    • memory/2772-3-0x000007FEF5583000-0x000007FEF5584000-memory.dmp

      Filesize

      4KB

    • memory/2772-4-0x000007FEF5580000-0x000007FEF5F6C000-memory.dmp

      Filesize

      9.9MB