Analysis
-
max time kernel
105s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 20:11
Static task
static1
1 signatures
General
-
Target
windows_shellcode_loader.exe
-
Size
1.8MB
-
MD5
880a88bc4d6883b288e9fe5991396afc
-
SHA1
f448f7266c97e98fb8fdfa90d33ad775ee8ac3cc
-
SHA256
2437709b8e2f53f242849d6b45ebabd03226ee70d508926746989c368ffc3df7
-
SHA512
16d4014a54a416785fe2d784370a839c4fd56c6bc394f68edea3dc02b9e9bf0891f4f4a286ce874de1e41262a7debdd15ddf3b05d146851c083ac5f2a7bd0a44
-
SSDEEP
49152:a2LkiBtAvvAEF5+sFrguhJ2B+qVIUZKrhpE94IU6i:eFjODFH+
Malware Config
Extracted
Family
asyncrat
Version
L838 RAT v1.0.0
Botnet
Default
Mutex
sfsafqagbiv
Attributes
-
delay
1
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/5696-1-0x000001AF04090000-0x000001AF040A3000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/5696-1-0x000001AF04090000-0x000001AF040A3000-memory.dmp family_asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com