Analysis
-
max time kernel
132s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 21:31
Behavioral task
behavioral1
Sample
AutoAfkClickerLauncher.exe
Resource
win7-20241010-en
4 signatures
150 seconds
General
-
Target
AutoAfkClickerLauncher.exe
-
Size
63KB
-
MD5
390437b31c7da088ee70e01c96e41b8d
-
SHA1
068b389aec23c2cddff54009c54064c968538552
-
SHA256
cdc18bb3c4bda6ea450a8928fdbe10e59fd198926f5761824387977c8c4a1594
-
SHA512
a35f1cc97afe6b4dd48a3f705320724d41a09f8571c41b2a1f0573ac04745adaef186363d85d1d96add7d1dfa9b873ecb14a9e544cf1481d060d50f25a74b321
-
SSDEEP
1536:XvCCPT9oapuKN7YUbNhB/IIMRuAdpqKmY7:Xvv+noYUbN8IMzGz
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
6.tcp.ngrok.io:8848
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 6.tcp.ngrok.io 2 6.tcp.ngrok.io -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2252 AutoAfkClickerLauncher.exe