Analysis
-
max time kernel
104s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 19:53
Static task
static1
1 signatures
General
-
Target
windows_shellcode_loader.exe
-
Size
1.9MB
-
MD5
71eb0dacf8cc3a5f28f97a3118617ba3
-
SHA1
a44ec48144e6324efb253ae1df0308fbb245ab3c
-
SHA256
bb4be945dc877db16d2e377d95b6f6ef09511704f87d7e42eb65079db9cf5bbd
-
SHA512
a370fd93672b41e2c3d45735709da921702d2c16a2124c2e6d3635a1848b63c69d6d164f681f69460b004496bb655ffc8a68e68162a8e4655611e2af87f761c0
-
SSDEEP
49152:MiIOBlFN+jcg72yasRc6lBH1KroUbRZPAi4IU6ibV:AagiypuuQb8iH+bV
Malware Config
Extracted
Family
asyncrat
Version
L838 RAT v1.0.0
Botnet
Default
Mutex
sfsafqagbiv
Attributes
-
delay
1
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/1932-0-0x0000021E28E90000-0x0000021E28EA3000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1932-0-0x0000021E28E90000-0x0000021E28EA3000-memory.dmp family_asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 pastebin.com 3 pastebin.com