Try VMRay Platform
Malicious
Classifications

Spyware Keylogger Backdoor

Threat Names

Mal/Generic-S AsyncRAT

Dynamic Analysis Report

Created on 2023-01-18T22:45:13+00:00

82acc1095843da9a689f138666b41520ccb2bda8be0c8b3cd734adbfa14d6746.exe

Windows Exe (x86-32)

Remarks (2/2)

(0x02000004): The operating system was rebooted during the analysis because the sample installed a startup script, task or application for persistence.

(0x0200000E): The overall sleep time of all monitored processes was truncated from "5 minutes, 10 seconds" to "10 seconds" to reveal dormant functionality.

General

14.73 KB total sent, 36.19 KB total received
4 ports: 80, 443, 53, 445
4 contacted IP addresses
10 URLs extracted
1 files downloaded
0 malicious hosts detected

DNS

183 Bytes sent, 493 Bytes received
3 queries for 3 domains
1 name server contacted
0 queries returned errors

HTTP/S

235 Bytes sent, 690 Bytes received
1 URLs, 1 contacted servers
5 sessions detected
Function Logfile
Exit-Icon

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Before

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
After

This feature requires an online-connection to the VMRay backend.

An offline version with limited functionality is also provided.
The offline version is supported only in Mozilla Firefoxwith deactivated setting \"security.fileuri.strict_origin_policy\".


    
Screenshot
Expand-Icon
Exit-Icon
icon_left
icon_left
image