Analysis
-
max time kernel
36s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2025, 19:49
Behavioral task
behavioral1
Sample
4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe
Resource
win10v2004-20250410-en
3 signatures
60 seconds
General
-
Target
4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe
-
Size
63KB
-
MD5
e0e1341087c4322f6c13c4186510c4b7
-
SHA1
cee1280d0a2da82b5179307428a0cd2481a66abe
-
SHA256
4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af
-
SHA512
216f0ad65407bd2038b19c8de8cbd09774a4cf4b0157c9ce8aa477065c4c5e7a8237a11875eadd2f5781f66b15b9cce373db7161e10cbc61fa418775c5073190
-
SSDEEP
1536:KZuttUdjLAQJlZGLAncCGbbvwoAlGJ2pqKmY7:KZuttUdjvJlZGUrGbbvj1z
Malware Config
Extracted
Family
asyncrat
Version
5.0.5
Botnet
Clients
C2
ahmedyassin.ddns.net:4449
Mutex
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
Attributes
-
delay
1
-
install
true
-
install_file
jesus.exe
-
install_folder
%AppData%
aes.plain
Signatures
-
Asyncrat family
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeSecurityPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeTakeOwnershipPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeLoadDriverPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeSystemProfilePrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeSystemtimePrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeProfSingleProcessPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeIncBasePriorityPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeCreatePagefilePrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeBackupPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeRestorePrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeShutdownPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeDebugPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeSystemEnvironmentPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeRemoteShutdownPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeUndockPrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: SeManageVolumePrivilege 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: 33 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: 34 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: 35 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe Token: 36 1864 4c48dabdcdd34b157eacde37eedb2d8be7a9817805daa057cfc7c103a789e4af.exe