Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: 6161 |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: ohsexoh.freeddns.org |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: | CRACKED BY https://t.me/xworm_v2 |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: false |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: AsyncMutex_6SI8OkPnk |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: 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 |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: 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 |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: true |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: null |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp | String decryptor: DOOOOOOONE2025 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: 6161 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: ohsexoh.freeddns.org |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: | CRACKED BY https://t.me/xworm_v2 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: false |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: AsyncMutex_6SI8OkPnk |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: 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 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: 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 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: false |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: true |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: null |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: false |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack | String decryptor: DOOOOOOONE2025 |
Source: powershell.exe, 00000003.00000002.2150967102.000002D0EAD19000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://crl.m |
Source: aspnet_compiler.exe, 00000015.00000002.4157158039.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en |
Source: aspnet_compiler.exe, 00000015.00000002.4157158039.0000000000DC8000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab |
Source: powershell.exe, 00000003.00000002.1970750932.000002D081600000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://ipinfo.io |
Source: powershell.exe, 00000014.00000002.1917706450.0000016967E99000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.2064757512.000001697D090000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000014.00000002.1917706450.0000016967499000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://localhost:3030/Service.asmx |
Source: powershell.exe, 00000003.00000002.2122928090.000002D090075000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://nuget.org/NuGet.exe |
Source: powershell.exe, 00000003.00000002.1970750932.000002D080229000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://pesterbdd.com/images/Pester.png |
Source: powershell.exe, 00000003.00000002.1970750932.000002D080001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.1917706450.0000016964BD1000.00000004.00000800.00020000.00000000.sdmp, aspnet_compiler.exe, 00000015.00000002.4165262476.0000000002D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name |
Source: powershell.exe, 00000003.00000002.1970750932.000002D080229000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html |
Source: powershell.exe, 00000003.00000002.1970750932.000002D080001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.1917706450.0000016964BD1000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://aka.ms/pscore68 |
Source: powershell.exe, 00000003.00000002.2145516549.000002D0EA450000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://alasfar-atc.com/x1ffqzjq.fup/f5cjxaxo.jpg |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot$BotToken/sendMessage |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot$BotToken/sendPhoto |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot8168254885:AAGgICtfG4yYWGNfRJQuM0_XqdKd4ysvR5I/sendMessage |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.org/bot8168254885:AAGgICtfG4yYWGNfRJQuM0_XqdKd4ysvR5I/sendPhoto |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://api.telegram.orgx |
Source: powershell.exe, 00000003.00000002.2122928090.000002D090075000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/ |
Source: powershell.exe, 00000003.00000002.2122928090.000002D090075000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/Icon |
Source: powershell.exe, 00000003.00000002.2122928090.000002D090075000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://contoso.com/License |
Source: powershell.exe, 00000003.00000002.1970750932.000002D080229000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://github.com/Pester/Pester |
Source: powershell.exe, 00000003.00000002.1970750932.000002D0817DA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000014.00000002.1917706450.0000016965C3A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://go.micro |
Source: powershell.exe, 00000014.00000002.2060343037.000001697CCEE000.00000004.00000020.00020000.00000000.sdmp | String found in binary or memory: https://go.microsoft.c |
Source: powershell.exe, 00000003.00000002.1970750932.000002D0817DA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.i |
Source: powershell.exe, 00000003.00000002.1970750932.000002D081600000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io |
Source: powershell.exe, 00000003.00000002.1970750932.000002D08058A000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/json |
Source: powershell.exe, 00000003.00000002.1970750932.000002D0817DA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missX |
Source: powershell.exe, 00000003.00000002.1970750932.000002D0817C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1970750932.000002D0817CD000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1970750932.000002D0817D1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1970750932.000002D0803D0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000003.00000002.1970750932.000002D0817DA000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://ipinfo.io/missingauth |
Source: powershell.exe, 00000003.00000002.2122928090.000002D090075000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://nuget.org/nuget.exe |
Source: aspnet_compiler.exe, 00000015.00000002.4165262476.0000000002D11000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: https://t.me/xworm_v2 |
Source: Yara match | File source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966491660.2.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 20.2.powershell.exe.16966443638.1.raw.unpack, type: UNPACKEDPE |
Source: Yara match | File source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.4155829420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000014.00000002.1917706450.000001696616A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000015.00000002.4165262476.0000000002D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: 00000014.00000002.1917706450.000001696643C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY |
Source: Yara match | File source: Process Memory Space: powershell.exe PID: 4428, type: MEMORYSTR |
Source: Yara match | File source: Process Memory Space: aspnet_compiler.exe PID: 7440, type: MEMORYSTR |
Source: 27#U0646.bat, type: SAMPLE | Matched rule: Detects powershell keyword obfuscated with carets Author: Florian Roth |
Source: amsi64_7584.amsi.csv, type: OTHER | Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 20.2.powershell.exe.16966491660.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966491660.2.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack, type: UNPACKEDPE | Matched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000015.00000002.4155829420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000015.00000002.4155829420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 00000014.00000002.1917706450.000001696616A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: 00000014.00000002.1917706450.000001696643C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown |
Source: Process Memory Space: powershell.exe PID: 7584, type: MEMORYSTR | Matched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen |
Source: Process Memory Space: aspnet_compiler.exe PID: 7440, type: MEMORYSTR | Matched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen |
Source: 27#U0646.bat, type: SAMPLE | Matched rule: SUSP_PowerShell_Caret_Obfuscation_2 date = 2019-07-20, author = Florian Roth, description = Detects powershell keyword obfuscated with carets, reference = Internal Research |
Source: amsi64_7584.amsi.csv, type: OTHER | Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.1696705a0e0.5.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966443638.1.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 21.2.aspnet_compiler.exe.400000.0.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.16966427fe0.4.raw.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.16966427fe0.4.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.1696705a0e0.5.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.16966491660.2.unpack, type: UNPACKEDPE | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 20.2.powershell.exe.16966491660.2.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966491660.2.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 20.2.powershell.exe.16966443638.1.raw.unpack, type: UNPACKEDPE | Matched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000014.00000002.1917706450.0000016967059000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000015.00000002.4155829420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000015.00000002.4155829420.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000014.00000002.1917706450.0000016968A39000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |
Source: 00000014.00000002.1917706450.000001696616A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: 00000014.00000002.1917706450.000001696643C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04 |
Source: Process Memory Space: powershell.exe PID: 7584, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution |
Source: Process Memory Space: aspnet_compiler.exe PID: 7440, type: MEMORYSTR | Matched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys |