Analysis
-
max time kernel
104s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 00:14
Static task
static1
1 signatures
General
-
Target
shellcode_loader.exe
-
Size
1.7MB
-
MD5
7738fc1c644e75954d87e59f607c1dc1
-
SHA1
88797699e2449c749c3cf47b445e1802de3f0d0d
-
SHA256
aa25b09c0498daa80de2a413073b2e12c4dd5da6da775d67ca34622349d91eff
-
SHA512
08b8fdc3c181c7b76ec3b88dc04b7a8f2e73672ceb50743339558259a0a302b9b59704d5828a9f31b6505c5cdfbfcc93dc12a7944e8330ff8f1cafb38dd1ac06
-
SSDEEP
49152:4JbX0Bj7/5I+plh3dfd3hgkc+bVhdk4IU6ia:oG59eH+
Malware Config
Extracted
Family
asyncrat
Version
L838 RAT v1.0.0
Botnet
Default
Mutex
sfsafqagbiv
Attributes
-
delay
1
-
install
true
-
install_file
Runtime Broker.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
aes.plain
Signatures
-
Asyncrat family
-
resource yara_rule behavioral1/memory/4280-1-0x000001C007350000-0x000001C007463000-memory.dmp VenomRAT -
Venomrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/4280-1-0x000001C007350000-0x000001C007463000-memory.dmp family_asyncrat -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 pastebin.com 2 pastebin.com -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4280 wrote to memory of 4324 4280 shellcode_loader.exe 86 PID 4280 wrote to memory of 4324 4280 shellcode_loader.exe 86