Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 18:57
Behavioral task
behavioral1
Sample
client.exe
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
client.exe
-
Size
45KB
-
MD5
c67a1e895aa31c3694b0f95ff22aaee0
-
SHA1
32ce32b7b8215bb64eec2c00a9bd7538fe18e8b0
-
SHA256
43076d69daa7ac36907ae35650ccc5151f251fc8b95b35c07f2adcab0a028639
-
SHA512
6e7330e19b41f88fc8294c040ac5181a13df2113c556765a0199dc421b2ae195cda204e53020d3406df02d3da218e6de75da282fd26a7987c09f87fe342dbc8f
-
SSDEEP
768:zuETKT0k3qXWUrV6e1mo2qyIOKEbHOZjNOPIMJzjbZgX3iVfISPDNz4xLuBDZtj:zuETKT0cE2/D3ch3MJ3b2XSVJDNz4edp
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
197.48.74.234:6606
197.48.74.234:8888
Mutex
qQsL8NSy01jD
Attributes
-
delay
3
-
install
false
-
install_file
ratatoulie.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language client.exe