Click to jump to signature section
Source: wzt5xcg.localto.net | Avira URL Cloud: Label: malware |
Source: file.exe | Malware Configuration Extractor: AsyncRAT {"External_config_on_Pastebin": "null", "Server": "wzt5xcg.localto.net", "Ports": "1604,5274", "Version": "0.5.7B", "Autorun": "false", "Install_Folder": "KYGOClient.exe", "Install_File": "dkdJQzRXdUpMV2syb1FUTzZyT0VRTzJmalpUdWc2RGY="} |
Source: file.exe | ReversingLabs: Detection: 86% |
Source: Submited Sample | Integrated Neural Analysis Model: Matched 100.0% probability |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: file.exe | Static PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Source: Malware configuration extractor | URLs: wzt5xcg.localto.net |
Source: global traffic | TCP traffic: 116.203.56.216 ports 5274,2,4,5,7,1604 |
Source: Yara match | File source: file.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE |
Source: global traffic | TCP traffic: 192.168.2.5:49705 -> 116.203.56.216:5274 |
Source: Joe Sandbox View | IP Address: 116.203.56.216 116.203.56.216 |
Source: Joe Sandbox View | ASN Name: HETZNER-ASDE HETZNER-ASDE |
Source: unknown | UDP traffic detected without corresponding DNS query: 1.1.1.1 |
Source: global traffic | DNS traffic detected: DNS query: wzt5xcg.localto.net |
Source: Yara match | File source: file.exe, type: SAMPLE |
Source: Yara match | File source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000000.00000000.2078557398.0000000000112000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: file.exe PID: 2000, type: MEMORYSTR |
Source: file.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: file.exe, type: SAMPLE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: file.exe, type: SAMPLE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000000.00000000.2078557398.0000000000112000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: Process Memory Space: file.exe PID: 2000, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: file.exe, 00000000.00000000.2078578693.000000000011E000.00000002.00000001.01000000.00000003.sdmp | Binary or memory string: OriginalFilenameStub.exe" vs file.exe |
Source: file.exe | Binary or memory string: OriginalFilenameStub.exe" vs file.exe |
Source: file.exe | Static PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE |
Source: file.exe, type: SAMPLE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: file.exe, type: SAMPLE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: file.exe, type: SAMPLE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 0.0.file.exe.110000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000000.00000000.2078557398.0000000000112000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: Process Memory Space: file.exe PID: 2000, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: file.exe, Settings.cs | Base64 encoded string: 'K60oVrq/3SKe+wD2IrVvqik46b55i7I6c3kAvBAOWpQCOmgJrL7NLuQNyhoRK69GETK6Y1SBfT+lWBr1jKxi0CRq8A/TF7DmSg/DpI/gzOw=', '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', 'hqRpb |