Analysis

  • max time kernel
    55s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    30/03/2025, 19:41 UTC

General

  • Target

    90b3d5220b7b7d6cb1a2c0aee36948ef9682c18f37cbc312db062446870355c1.exe

  • Size

    400KB

  • MD5

    8b9ddfe422a2f9445d396b313c60576e

  • SHA1

    ca1f900eda89402c30644149e9bb11daaadb9c33

  • SHA256

    90b3d5220b7b7d6cb1a2c0aee36948ef9682c18f37cbc312db062446870355c1

  • SHA512

    f54376f42d09d24a3a9181dd5c4324b4e07d67fce89bf6eb51cfdc66be4010cc1146e92a3e7abf806816731f25c974f6238e8b6488b363c649701725c572b234

  • SSDEEP

    6144:eZBvq/aNNdZsRHOLgLwLOM5gGSRqnCCSxOYciT4uZTKcVY7J9cXokuFg0:9wLgcz56xvcs1Wc2IXok

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

Mutex

XP6xeZIs9DqN

Attributes
  • delay

    3

  • install

    false

  • install_file

    hamid.exe

  • install_folder

    %AppData%

aes.plain
1
raRRaRCPOkQUYbYuyr1JiU8nYtFiFxJF

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\90b3d5220b7b7d6cb1a2c0aee36948ef9682c18f37cbc312db062446870355c1.exe
    "C:\Users\Admin\AppData\Local\Temp\90b3d5220b7b7d6cb1a2c0aee36948ef9682c18f37cbc312db062446870355c1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3052-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/3052-1-0x0000000000E40000-0x0000000000EAA000-memory.dmp

    Filesize

    424KB

  • memory/3052-2-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/3052-3-0x0000000074D80000-0x000000007546E000-memory.dmp

    Filesize

    6.9MB

  • memory/3052-4-0x0000000074D80000-0x000000007546E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.