Click to jump to signature section
Source: gagagggagagag.exe | Avira: detected |
Source: gagagggagagag.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "185.16.38.41", "Ports": "2033,2034,2035,2022,2023,2024,20000,6666", "Version": "| Edit 3LOSH RAT", "Autorun": "false", "Install_Folder": "ak1ZQjZ2bEQ3VVlxMkRzMndYM21JNzlya1lzVVREMko=", "Install_File": "SrlfNI5vbH1HHl50MHFQyV+obaGXluc/Su4FpzcCma+0EbqU24JiGETuF+BSFfitNxYZi+Bz7SWKBKl1Q35bhCToFLRQxsLGdDHFoCTPXzY=", "AES_key": "jMYB6vlD7UYq2Ds2wX3mI79rkYsUTD2J", "Mutex": "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", "Certificate": "false", "ServerSignature": "true", "BDOS": "false", "Startup_Delay": "3", "Group": "null"} |
Source: gagagggagagag.exe | ReversingLabs: Detection: 78% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: gagagggagagag.exe | Joe Sandbox ML: detected |
Source: gagagggagagag.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: gagagggagagag.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Network traffic | Suricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 185.16.38.41:2024 -> 192.168.2.7:49705 |
Source: Network traffic | Suricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 185.16.38.41:2024 -> 192.168.2.7:49705 |
Source: Network traffic | Suricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 185.16.38.41:2024 -> 192.168.2.7:49705 |
Source: Network traffic | Suricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 185.16.38.41:2024 -> 192.168.2.7:49705 |
Source: Yara match | File source: gagagggagagag.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE |
Source: global traffic | TCP traffic: 192.168.2.7:49705 -> 185.16.38.41:2024 |
Source: Joe Sandbox View | ASN Name: PL-SKYTECH-ASPL PL-SKYTECH-ASPL |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: unknown | TCP traffic detected without corresponding DNS query: 185.16.38.41 |
Source: gagagggagagag.exe, 00000000.00000002.3736258617.0000000005655000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: gagagggagagag.exe, 00000000.00000002.3736258617.0000000005655000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.dr | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: gagagggagagag.exe, 00000000.00000002.3734026490.0000000003021000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: Yara match | File source: gagagggagagag.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: 00000000.00000002.3734026490.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: gagagggagagag.exe PID: 1448, type: MEMORYSTR |
Source: gagagggagagag.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: gagagggagagag.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: gagagggagagag.exe PID: 1448, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: C:\Users\user\Desktop\gagagggagagag.exe | Code function: 0_2_02EEE048 | 0_2_02EEE048 |
Source: C:\Users\user\Desktop\gagagggagagag.exe | Code function: 0_2_076117C0 | 0_2_076117C0 |
Source: gagagggagagag.exe, 00000000.00000002.3736945735.0000000005939000.00000004.00000010.00020000.00000000.sdmp | Binary or memory string: OriginalFilenameUNKNOWN_FILET vs gagagggagagag.exe |
Source: gagagggagagag.exe, 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs gagagggagagag.exe |
Source: gagagggagagag.exe | Binary or memory string: OriginalFilenameStub.exe" vs gagagggagagag.exe |
Source: gagagggagagag.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: gagagggagagag.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: gagagggagagag.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.gagagggagagag.exe.da0000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000000.00000000.1282985227.0000000000DA2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: gagagggagagag.exe PID: 1448, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: gagagggagagag.exe, PSUyOwdskSQDg.cs | Base64 encoded string: 'w70q7iVCZUBLrH36j5S+u4zs3rMxS3z+dxF1Nb66k6pQIfe6u4zLj0oOwqpw3Yy7wwst9UMmnJYhEJZSwdN6PBNMOnBzjQaR5S0J3VrRc9ZdxW/fTJ9Q0OZ947SQc9j5', 'imJ/H4r5QuFnaeCZiwMO/avsvvxJ+sKZTo97OWlHWoWSs0umkbF4NfJa7gaaS8rMuhquU4sSpsuWLw6PUi6FMAEAD21OaSCoX8NgcSbdeEU=', 'jCVMI+7PFiW/9n76x+shPVhOzUqUXky1KZBSX2TXQKS3QhZ4z0FocqBcaJ+bdUAF9tzpIjT/lN10cH40GvKQFA==', 'SrlfNI5vbH1HHl50MHFQyV+obaGXluc/Su4FpzcCma+0EbqU24JiGETuF+BSFfitNxYZi+Bz7SWKBKl1Q35bhCToFLRQxsLGdDHFoCTPXzY=', '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 |