Click to jump to signature section
Source: 2.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "joifjfjopv.duckdns.org", "Ports": "1010", "Version": "| Edit by Vinom Rat", "Autorun": "false", "Install_Folder": "TDA5WTZ6VGw0dGdXTmN6cHZzMXNrOUNnc29hUUg2OHA=", "Install_File": "XFgc05+2DOkOK91Q51ZE4B0Hfd2xmkGDLBmi7Pol9KIARMqaUUmXtwNqVqyeKCn8MZHcq7SXkwHwzFY87q/uBZLpiaMUWM3UVUM/Tnh5lJk=", "AES_key": "L09Y6zTl4tgWNczpvs1sk9CgsoaQH68p", "Mutex": "TBC2UYLW/AgKw1ZuqgloxojTTnWeyZKdKFOAIhGN/QwT2N6T/JLd4E+JyfBXPmNu30UMW5KUXhEHUtvTeY7GuJrPZ/6DjbjdKfQrhN5ZY56qui5V2Hk12/x/XdC9zreODHamOitft07WT4ctUEMZfolChW+f9KDsMuffTuXYUiQhWI2lbxN7YmX6RYps3dbzPT/lPAv7unyxVUcFJ1bd7a7IHfSQcl+xr2MBhdkcwjl53ljVuvugPVNrxyaNbatjqDIOMpXEMMWhDe7ORCconegsKI345Yn/CvI5foT0/TUM20Cx+Y+Ds2ZbyiC5kamlKb8qncyKvIIStio/sd3MV3tZpBaVXFIvd+Jz5zGLNj62Xcwzeail8/Wcjn+rsUKskbE7RmYueD8RRUBMJy8R97Vc2sjnWfT0wMoVQXHGrFkx26eZTMj9zAXVLeQvF8NIbwPX5S0RTUAKekGbbzHsFOk6VQ1NK1icIoKTDz2em0Z9DyvO/tBgdNn5JEGHil8QquDeO7Lldqc5YALk5yt0bOwFd6RCQpZYkFjzH4nu14EwUKddyafcMzTt1eb3yVAE6AJcGnE4xN9+5Qyk1rcRbXnbaJEU3EkBm2dQGma7lx+8+W2Gikzc7KBylhiDcfOAkCylyhevSI+xQg9efIWfgBOuhBLgDt9DLTw2B4u4H/g=", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"} |
Source: 2.exe | ReversingLabs: Detection: 76% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: 2.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 2.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: joifjfjopv.duckdns.org |
Source: unknown | DNS query: name: joifjfjopv.duckdns.org |
Source: Yara match | File source: 2.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE |
Source: global traffic | TCP traffic: 192.168.2.5:49704 -> 216.105.171.163:1010 |
Source: Joe Sandbox View | ASN Name: DEDICATEDUS DEDICATEDUS |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: joifjfjopv.duckdns.org |
Source: global traffic | DNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa |
Source: Yara match | File source: 2.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR |
Source: 2.exe, LimeLogger.cs | .Net Code: KeyboardLayout |
Source: 2.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 2.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR | Matched rule: Detects AsyncRAT Author: ditekSHen |
Source: C:\Users\user\Desktop\2.exe | Code function: 0_2_0147E048 | 0_2_0147E048 |
Source: 2.exe, 00000000.00000000.2060354830.0000000000E32000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs 2.exe |
Source: 2.exe, 00000000.00000002.4520043856.0000000005BF9000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs 2.exe |
Source: 2.exe | Binary or memory string: OriginalFilenameStub.exe" vs 2.exe |
Source: 2.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: 2.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 2.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.2.exe.e20000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000000.2060338906.0000000000E22000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000002.4518541658.00000000014E8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: 2.exe PID: 5736, type: MEMORYSTR | Matched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT |
Source: 2.exe, Settings.cs | Base64 encoded string: 'r0zheVW0uywoDgg2tUu/HCLSaZG/bO1LbmZXV00BSyUaK1p+A3wtUNLXc7cGl962pStjldOei9GwOo2NDhVEGKoSHKZy+HwxVRdDg5GUHso=', 'GU1LR2RvIyvK7fKjJnkLo5QdFbAdsrUbCmZhM4V6NfWGX22QiovrwmXgDCmNKjG5WqYyxX/R9H5yz9VAFy9mAQ==', 'XFgc05+2DOkOK91Q51ZE4B0Hfd2xmkGDLBmi7Pol9KIARMqaUUmXtwNqVqyeKCn8MZHcq7SXkwHwzFY87q/uBZLpiaMUWM3UVUM/Tnh5lJk=', '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 |