Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-01-2025 16:58
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
file.exe
-
Size
45KB
-
MD5
b525ea79a587def213905cf77f2b5e7e
-
SHA1
08211f74b221764ad5e0ff24c914c8d8bf0fdedb
-
SHA256
7d11842cce74194adfff7709d7ba3f560dd381dc05b79810ac5c08bb220e6556
-
SHA512
dc9ff41591b455589a97f09245b2a70fccb1a68f1176696f386b634511f8498df8d549d9e931919c7e598586251a6552f118f0a439e4e708568afb7a0e7f46b1
-
SSDEEP
768:OuUOVTwkbBHWU72ZcFmo2qjXMDnIMWBVEWWzjbvgX3isq+4YxUNcDZCf+:OuUOVTwA4M2cM2BVfW3bYXSxr+dCf+
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
wzt5xcg.localto.net:1604
wzt5xcg.localto.net:5274
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_file
KYGOClient.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe