Resubmissions

13/01/2025, 00:36

250113-ax4gmsxjfv 10

13/01/2025, 00:03

250113-acj79swjft 10

12/01/2025, 13:58

250112-q9s5faxnfp 10

Analysis

  • max time kernel
    835s
  • max time network
    898s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13/01/2025, 00:03

General

  • Target

    6d1c48916c9129016e27531ffad82721b6f224120470db6ae42d75242c708439N.exe

  • Size

    74KB

  • MD5

    6458aa24ec566dd7a15df30f7dc6cd20

  • SHA1

    dd7d94c1d325c7c4eb143fbba7cbe6e0092576a0

  • SHA256

    6d1c48916c9129016e27531ffad82721b6f224120470db6ae42d75242c708439

  • SHA512

    48e67edc27628d84421bc3525e67382285f9f1176555f0c60710e02ef23f02eb3d82b619f6772cb70e4ed6b6e0d6549006ac60d0e4ccbd78aa83e25155205fce

  • SSDEEP

    1536:nUk0cxVGlCBiPMVJKTc3XIXH1bk/aQxiQzciLVclN:nURcxVMWiPMVJKKyH1bkoQzBY

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

Mutex

gmgvhbbdlzsg

Attributes
  • c2_url_file

    https://paste.com.tr/raw/hahuexlr

  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d1c48916c9129016e27531ffad82721b6f224120470db6ae42d75242c708439N.exe
    C:\Users\Admin\AppData\Local\Temp\6d1c48916c9129016e27531ffad82721b6f224120470db6ae42d75242c708439N.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1652-0-0x000007FEF53B3000-0x000007FEF53B4000-memory.dmp

    Filesize

    4KB

  • memory/1652-1-0x0000000001120000-0x0000000001138000-memory.dmp

    Filesize

    96KB

  • memory/1652-3-0x000007FEF53B0000-0x000007FEF5D9C000-memory.dmp

    Filesize

    9.9MB

  • memory/1652-4-0x000007FEF53B0000-0x000007FEF5D9C000-memory.dmp

    Filesize

    9.9MB

  • memory/1652-5-0x000007FEF53B3000-0x000007FEF53B4000-memory.dmp

    Filesize

    4KB

  • memory/1652-6-0x000007FEF53B0000-0x000007FEF5D9C000-memory.dmp

    Filesize

    9.9MB