Overview
overview
10Static
static
10net8.0-win...er.exe
windows11-21h2-x64
1net8.0-win...er.exe
windows11-21h2-x64
1net8.0-win...ion.js
windows11-21h2-x64
3net8.0-win...ion.py
windows11-21h2-x64
3net8.0-win...px.exe
windows11-21h2-x64
5net8.0-win...I2.dll
windows11-21h2-x64
1net8.0-win...on.dll
windows11-21h2-x64
1net8.0-win...nt.dll
windows11-21h2-x64
1net8.0-win...on.bat
windows11-21h2-x64
8net8.0-win...ll.bat
windows11-21h2-x64
1net8.0-win...nt.dll
windows11-21h2-x64
3Analysis
-
max time kernel
850s -
max time network
900s -
platform
windows11-21h2_x64 -
resource
win11-20250218-en -
resource tags
arch:x64arch:x86image:win11-20250218-enlocale:en-usos:windows11-21h2-x64system -
submitted
28/02/2025, 17:50
Behavioral task
behavioral1
Sample
net8.0-windows/Astral Stealer.exe
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
net8.0-windows/Astral Stealer.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
net8.0-windows/Astral_assets/Injection/discord-injection.js
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
net8.0-windows/Astral_assets/obfuscation/obfuscation.py
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
net8.0-windows/Astral_assets/upx/upx.exe
Resource
win11-20250218-en
Behavioral task
behavioral6
Sample
net8.0-windows/Guna.UI2.dll
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
net8.0-windows/Newtonsoft.Json.dll
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
net8.0-windows/System.Management.dll
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
net8.0-windows/install-python.bat
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
net8.0-windows/install.bat
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
net8.0-windows/runtimes/win/lib/net7.0/System.Management.dll
Resource
win11-20250217-en
General
-
Target
net8.0-windows/Astral_assets/upx/upx.exe
-
Size
525KB
-
MD5
8a98406e32ed6139bd9e75342d452948
-
SHA1
ed77737b88a7351d0bc5f542ddb7ce84f8f95588
-
SHA256
a4240ea0e8a916d15f8391edef9705ab4de1f516dd360f0a336c5358686d434b
-
SHA512
f5b17975560d97308a6ee66845225715e82bade9df7bc36821c76fe67fcf8d22929bf21b85e28dd11b7399d0109ab1f3786fd2010c2e5023d3a93d2bd5cf678b
-
SSDEEP
12288:fOHsWPQsJdQmiR0eYG16fyP8RHzS75CaNgMYqIW7I2:2QmiWK16rRHzS7U6ip2
Malware Config
Signatures
-
resource yara_rule behavioral5/memory/4676-0-0x0000000000400000-0x0000000000603000-memory.dmp upx behavioral5/memory/4676-2-0x0000000000400000-0x0000000000603000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\net8.0-windows\Astral_assets\upx\upx.exe"C:\Users\Admin\AppData\Local\Temp\net8.0-windows\Astral_assets\upx\upx.exe"1⤵PID:4676
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=5168,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=1036 /prefetch:141⤵PID:764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4712,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:141⤵PID:1180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations --always-read-main-dll --field-trial-handle=4032,i,8156301195647385391,612045039718669237,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:141⤵PID:2392