Analysis
-
max time kernel
83s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/04/2025, 19:43
Behavioral task
behavioral1
Sample
250421-yenv8ss1cx.exe
Resource
win10v2004-20250314-en
3 signatures
90 seconds
General
-
Target
250421-yenv8ss1cx.exe
-
Size
200KB
-
MD5
869e758ea38f053444309626d509b764
-
SHA1
7c7df565c4e0ce52695504909789975045fb5ff5
-
SHA256
1901ae363fbfc2c882adfe815208967647d7731c14823aeb5c7e4165f8e92372
-
SHA512
a2a015fccbddef198edbcac0a77ebc062dab9b1fada8ec4bfec181fab9583c4bf03dcd5f07f04a45521725cb1094287e2f87b886edc620079728cf4783b71466
-
SSDEEP
3072:DuPBTgKa2BskDy3bCD81m8biXndHuNHx:DuPVHBO3bp00F
Malware Config
Extracted
Family
asyncrat
Version
0.5.8
Botnet
Default
C2
192.168.1.10:1337
192.168.1.10:4455
184.90.251.249:1337
184.90.251.249:4455
Mutex
NKwfJUHlFdxI
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250421-yenv8ss1cx.exe