Analysis

  • max time kernel
    94s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 09:36

General

  • Target

    ddosiarka FIRST.exe

  • Size

    74KB

  • MD5

    30918d21d2d28f64f0ec9da829d270d7

  • SHA1

    ec47a8c00ab0af3652d843c8cf60cc0c26888341

  • SHA256

    8d002e9c3f7c8e30ee67cb68aadbc532da12d3b592ba2d0781af2cc64e3b1056

  • SHA512

    1d6340512fdb911908d94ef83ada92678fca5bb96aa256ef3502699488434e6501822bf9e8db70b75f91080c32a6fe7ff02bf5cb517fa28eebe08f0ccef892e9

  • SSDEEP

    1536:6UxQcxHCapCtGPMVKCyeFIF11bq/fItOgQzcOLVclN:6UOcxHCoeGPMVx211bqwpQHBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

Mutex

qxkfylnnpgxzven

Attributes
  • delay

    1

  • install

    true

  • install_file

    svhost.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious use of AdjustPrivilegeToken 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddosiarka FIRST.exe
    "C:\Users\Admin\AppData\Local\Temp\ddosiarka FIRST.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1620
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1140

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1620-0-0x00007FFB52293000-0x00007FFB52295000-memory.dmp

      Filesize

      8KB

    • memory/1620-1-0x0000000000130000-0x0000000000148000-memory.dmp

      Filesize

      96KB

    • memory/1620-3-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

      Filesize

      10.8MB

    • memory/1620-4-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

      Filesize

      10.8MB