Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 16:00
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250314-en
5 signatures
150 seconds
General
-
Target
file.exe
-
Size
45KB
-
MD5
73b24e046f0348e3ffc30398a8306a51
-
SHA1
1d058188b3e194107fcde90e9c3a7762561bedd4
-
SHA256
e031d5b9b47ac7d1ceabde5e77aa9555b7ca4603bf5f3195731922a677bf391b
-
SHA512
19bb17f7a16e9ee799ff6523865da37aa474f2372b4ef0242dd4e7e0c7e71d7e96596758c6f9ef1cf925692263386e27345cec2d9a3bc383f4f1757e2ed6c3b5
-
SSDEEP
768:puPfZTg4pYiWUU9jjmo2qrqAPB+luOJPISzjbWgX3iZ19p9UT7BDZ6x:puPfZTgKa21+UuOmS3bJXSZ19petd6x
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
cryptoghost.zapto.org:2000
Mutex
Dm4vMelJMBBG
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Extracted
Family
latentbot
C2
cryptoghost.zapto.org
Signatures
-
Asyncrat family
-
Latentbot family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe