Source: 3.2.nona.exe.a50000.0.unpack |
Malware Configuration Extractor: AsyncRAT {"Server": "127.0.0.1,warzonecdt.duckdns.org,putha.duckdns.org", "Ports": "9199,9192,9919,7100,7200", "Version": " 1.0.7", "Autorun": "false", "Install_Folder": "%AppData%", "Install_File": "filll.exe", "AES_key": "R449dD52ohu4cvwZ47UHqZdRmejwnPH4", "Mutex": "DcRatMutex_qwqdanchun", "AntiDetection": "null", "External_config_on_Pastebin": "false", "BDOS": "1", "Startup_Delay": "bW3EMGVVsh5fIXA3CDX9qLner45CEoBP5fws+fEJWGW7wpClj2e4tj9SEZlGD8cGaiZo+ixvYD+wyTiPxKXRMA==", "HWID": "null", "Certificate": "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", "ServerSignature": "iTmt+3xoTpCGuNDk7TkMlJgra1WajouthkNqGPo/cPFLunvenIQhhPYWyRbVsRDI+8srL2lxtNwnUsouRQVo0taz5oErU/DXtfySZ2AmtIIsG2hbRaoezdtrDyNF5TawBiDIXo/ZE5arIJpkazs8WZw8ra5hv+0M6xdAiI6ox04=", "Group": "false"} |
Source: nona.exe |
Virustotal: Detection: 61% |
Perma Link |
Source: putha.duckdns.org |
Avira URL Cloud: Label: malware |
Source: nona.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: Malware configuration extractor |
URLs: warzonecdt.duckdns.org |
Source: Malware configuration extractor |
URLs: putha.duckdns.org |
Source: unknown |
DNS query: name: warzonecdt.duckdns.org |
Source: unknown |
DNS query: name: putha.duckdns.org |
Source: global traffic |
TCP traffic: 192.168.2.3:49743 -> 45.164.103.115:7100 |
Source: global traffic |
TCP traffic: 192.168.2.3:49746 -> 141.255.144.239:9919 |
Source: Joe Sandbox View |
ASN Name: IELOIELOMainNetworkFR IELOIELOMainNetworkFR |
Source: nona.exe, 00000003.00000002.555115359.0000000002F11000.00000004.00000800.00020000.00000000.sdmp |
String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: unknown |
DNS traffic detected: queries for: putha.duckdns.org |
Source: Yara match |
File source: nona.exe, type: SAMPLE |
Source: Yara match |
File source: 3.2.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.0.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000003.00000000.285715626.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: nona.exe PID: 672, type: MEMORYSTR |
Source: nona.exe, 00000003.00000000.285721972.0000000000A5E000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: OriginalFilenameClient.exe" vs nona.exe |
Source: nona.exe, 00000003.00000002.554695917.0000000000F59000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: OriginalFilenameclr.dllT vs nona.exe |
Source: nona.exe |
Binary or memory string: OriginalFilenameClient.exe" vs nona.exe |
Source: C:\Users\user\Desktop\nona.exe |
Code function: 3_2_00007FFC089501F8 |
3_2_00007FFC089501F8 |
Source: nona.exe |
Virustotal: Detection: 61% |
Source: nona.exe |
Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
Source: C:\Users\user\Desktop\nona.exe |
Key opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Section loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dll |
Jump to behavior |
Source: nona.exe, Client/Install/NormalStartup.cs |
Base64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: nona.exe, Client/Settings.cs |
Base64 encoded string: 'sILiO2UdsfAABE6sxhBkYFdwj8OfOxQVAvIop2js+BZ4DG/krvUxTLUO6V9O2O8haDjbOFo1E/uD01XVaYwN9EnI9NrIqtxBoBbaw2ygJWy2fzlTHlwrCL9YG9/A9WyWeERzTYG404TATYj18TWtQg==', 'IGZpcghAH+bdThZCI7LFdXQ9uzbTboXLRNb+wGVUQ+iMvWZaUy48tyl/++5Fe+KDCBJz+Pn77g2lcPn5EkMMWQ==', 'z+q1RAgW8qcp+1KqojZULv7TKO6AaPyAppp2BVt4aWqK+i2PGowWjM6+kB/ldtrIDIJ+yWFcgC1TSbs32PUxF81e5jsg0Je/OIsWaXldhO7vRxwT1TzVNyhD1vN1Oj2ZfOvA3x24T/yMD5hX2BDPaasMCdUKGcl1vwVJCDFq+uDvoJ1X6ED2nUvQrVMeOLgZzBjE9q3ku309dgAyssag22zq/L1STKHE138XuszXt9K+sD3td+6YOeaEKdOE4NimxI6FZ9CbvN53eXX66DVA5pzsNCJwV2TAmMRc3XYe2Io=', 'MAJQDMjozTmZKRwf0aGTroPaBwtynb+Tf98kHp85t43I7rFRqotugNdlb6/3i07ZZcpVr5YWDcE+YR5wKEz79g==', 'YuVD/0nw9nWx2ckgucZkjLNsEp496vRqQiX3vZLYyWOuXATAKniK0bRyaobXqzNZApBvv14KU6ltXP7i8lsNyA==' |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Install/NormalStartup.cs |
Base64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Settings.cs |
Base64 encoded string: 'sILiO2UdsfAABE6sxhBkYFdwj8OfOxQVAvIop2js+BZ4DG/krvUxTLUO6V9O2O8haDjbOFo1E/uD01XVaYwN9EnI9NrIqtxBoBbaw2ygJWy2fzlTHlwrCL9YG9/A9WyWeERzTYG404TATYj18TWtQg==', 'IGZpcghAH+bdThZCI7LFdXQ9uzbTboXLRNb+wGVUQ+iMvWZaUy48tyl/++5Fe+KDCBJz+Pn77g2lcPn5EkMMWQ==', 'z+q1RAgW8qcp+1KqojZULv7TKO6AaPyAppp2BVt4aWqK+i2PGowWjM6+kB/ldtrIDIJ+yWFcgC1TSbs32PUxF81e5jsg0Je/OIsWaXldhO7vRxwT1TzVNyhD1vN1Oj2ZfOvA3x24T/yMD5hX2BDPaasMCdUKGcl1vwVJCDFq+uDvoJ1X6ED2nUvQrVMeOLgZzBjE9q3ku309dgAyssag22zq/L1STKHE138XuszXt9K+sD3td+6YOeaEKdOE4NimxI6FZ9CbvN53eXX66DVA5pzsNCJwV2TAmMRc3XYe2Io=', 'MAJQDMjozTmZKRwf0aGTroPaBwtynb+Tf98kHp85t43I7rFRqotugNdlb6/3i07ZZcpVr5YWDcE+YR5wKEz79g==', 'YuVD/0nw9nWx2ckgucZkjLNsEp496vRqQiX3vZLYyWOuXATAKniK0bRyaobXqzNZApBvv14KU6ltXP7i8lsNyA==' |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Install/NormalStartup.cs |
Base64 encoded string: 'U09GVFdBUkVcTWljcm9zb2Z0XFdpbmRvd3NcQ3VycmVudFZlcnNpb25cUnVuXA==' |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Settings.cs |
Base64 encoded string: 'sILiO2UdsfAABE6sxhBkYFdwj8OfOxQVAvIop2js+BZ4DG/krvUxTLUO6V9O2O8haDjbOFo1E/uD01XVaYwN9EnI9NrIqtxBoBbaw2ygJWy2fzlTHlwrCL9YG9/A9WyWeERzTYG404TATYj18TWtQg==', 'IGZpcghAH+bdThZCI7LFdXQ9uzbTboXLRNb+wGVUQ+iMvWZaUy48tyl/++5Fe+KDCBJz+Pn77g2lcPn5EkMMWQ==', 'z+q1RAgW8qcp+1KqojZULv7TKO6AaPyAppp2BVt4aWqK+i2PGowWjM6+kB/ldtrIDIJ+yWFcgC1TSbs32PUxF81e5jsg0Je/OIsWaXldhO7vRxwT1TzVNyhD1vN1Oj2ZfOvA3x24T/yMD5hX2BDPaasMCdUKGcl1vwVJCDFq+uDvoJ1X6ED2nUvQrVMeOLgZzBjE9q3ku309dgAyssag22zq/L1STKHE138XuszXt9K+sD3td+6YOeaEKdOE4NimxI6FZ9CbvN53eXX66DVA5pzsNCJwV2TAmMRc3XYe2Io=', 'MAJQDMjozTmZKRwf0aGTroPaBwtynb+Tf98kHp85t43I7rFRqotugNdlb6/3i07ZZcpVr5YWDcE+YR5wKEz79g==', 'YuVD/0nw9nWx2ckgucZkjLNsEp496vRqQiX3vZLYyWOuXATAKniK0bRyaobXqzNZApBvv14KU6ltXP7i8lsNyA==' |
Source: C:\Users\user\Desktop\nona.exe |
Mutant created: \Sessions\1\BaseNamedObjects\DcRatMutex_qwqdanchun |
Source: classification engine |
Classification label: mal100.troj.evad.winEXE@1/0@5/3 |
Source: C:\Users\user\Desktop\nona.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
File read: C:\Windows\System32\drivers\etc\hosts |
Jump to behavior |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Helper/Methods.cs |
Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Helper/Methods.cs |
Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Helper/Methods.cs |
Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Helper/Methods.cs |
Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: nona.exe, Client/Helper/Methods.cs |
Security API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent() |
Source: nona.exe, Client/Helper/Methods.cs |
Security API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) |
Source: nona.exe |
Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR |
Source: nona.exe |
Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Source: nona.exe, Client/Connection/ClientSocket.cs |
.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[]) |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Connection/ClientSocket.cs |
.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[]) |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Connection/ClientSocket.cs |
.Net Code: Invoke System.Reflection.Assembly System.AppDomain::Load(System.Byte[]) |
Source: C:\Users\user\Desktop\nona.exe |
Code function: 3_2_00A530E5 push rax; ret |
3_2_00A530ED |
Source: C:\Users\user\Desktop\nona.exe |
Code function: 3_2_00A545A8 push rax; ret |
3_2_00A545B0 |
Source: C:\Users\user\Desktop\nona.exe |
Code function: 3_2_00A52F16 push 0000003Eh; retn 0000h |
3_2_00A52F18 |
Source: Yara match |
File source: nona.exe, type: SAMPLE |
Source: Yara match |
File source: 3.2.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.0.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000003.00000000.285715626.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: nona.exe PID: 672, type: MEMORYSTR |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Process information set: NOOPENFILEERRORBOX |
Jump to behavior |
Source: Yara match |
File source: nona.exe, type: SAMPLE |
Source: Yara match |
File source: 3.2.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.0.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000003.00000000.285715626.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: nona.exe PID: 672, type: MEMORYSTR |
Source: C:\Users\user\Desktop\nona.exe |
Last function: Thread delayed |
Source: C:\Users\user\Desktop\nona.exe |
File Volume queried: C:\ FullSizeInformation |
Jump to behavior |
Source: nona.exe, 00000003.00000002.554923843.0000000000FFD000.00000004.00000020.00020000.00000000.sdmp |
Binary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk/D |
Source: C:\Users\user\Desktop\nona.exe |
Memory allocated: page read and write | page guard |
Jump to behavior |
Source: nona.exe, Client/Helper/AntiProcess.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: nona.exe, Client/Connection/Win32.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Helper/AntiProcess.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 3.2.nona.exe.a50000.0.unpack, Client/Connection/Win32.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Helper/AntiProcess.cs |
Reference to suspicious API methods: ('OpenProcess', 'OpenProcess@kernel32.dll') |
Source: 3.0.nona.exe.a50000.0.unpack, Client/Connection/Win32.cs |
Reference to suspicious API methods: ('LoadLibraryA', 'LoadLibraryA@kernel32'), ('GetProcAddress', 'GetProcAddress@kernel32') |
Source: C:\Users\user\Desktop\nona.exe |
Queries volume information: C:\Users\user\Desktop\nona.exe VolumeInformation |
Jump to behavior |
Source: C:\Users\user\Desktop\nona.exe |
Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid |
Jump to behavior |
Source: Yara match |
File source: nona.exe, type: SAMPLE |
Source: Yara match |
File source: 3.2.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 3.0.nona.exe.a50000.0.unpack, type: UNPACKEDPE |
Source: Yara match |
File source: 00000003.00000000.285715626.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY |
Source: Yara match |
File source: Process Memory Space: nona.exe PID: 672, type: MEMORYSTR |
Source: nona.exe, nona.exe, 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: MSASCui.exe |
Source: nona.exe, nona.exe, 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: procexp.exe |
Source: nona.exe, nona.exe, 00000003.00000002.554497385.0000000000A52000.00000002.00000001.01000000.00000003.sdmp |
Binary or memory string: MsMpEng.exe |