| File name: | aimbot.exe |
| Full analysis: | https://app.any.run/tasks/3046930f-f83e-44a2-9f2f-50b1808e06b2 |
| Verdict: | Malicious activity |
| Threats: | AsyncRAT is a RAT that can monitor and remotely control infected systems. This malware was introduced on Github as a legitimate open-source remote administration software, but hackers use it for its many powerful malicious functions. |
| Analysis date: | January 28, 2024, 21:54:59 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows |
| MD5: | 4652B85155D7F9AA15FA51DED06E6DCA |
| SHA1: | 31D2252CDBFE44B2207608C06D88F9A55550DD89 |
| SHA256: | A6AC8266E13988C0EF77E048FE80D764EA97CB4A4B26482F906828DD870BA89E |
| SSDEEP: | 1536:8GkkuSRTPlaotdGojzb1me3QnEZZVclN:DkkuSRTPVTzb1meHzY |
| .exe | | | Generic CIL Executable (.NET, Mono, etc.) (56.7) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (21.3) |
| .scr | | | Windows screen saver (10.1) |
| .dll | | | Win32 Dynamic Link Library (generic) (5) |
| .exe | | | Win32 Executable (generic) (3.4) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:05:05 23:11:39+02:00 |
| ImageFileCharacteristics: | Executable |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 44544 |
| InitializedDataSize: | 4096 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xcbfe |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.7.0 |
| ProductVersionNumber: | 1.0.7.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | - |
| FileDescription: | - |
| FileVersion: | 1.0.7.0 |
| InternalName: | Client.exe |
| LegalCopyright: | - |
| LegalTrademarks: | - |
| OriginalFileName: | Client.exe |
| ProductName: | - |
| ProductVersion: | 1.0.7.0 |
| AssemblyVersion: | 1.0.7.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2568 | "C:\Users\admin\AppData\Local\Temp\aimbot.exe" | C:\Users\admin\AppData\Local\Temp\aimbot.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.0.7.0 Modules
AsyncRat(PID) Process(2568) aimbot.exe C2 (3)127.0.0.1 146.70.83.186 10.13.106.229 Ports (3)8848 1337 1443 BotnetDefault Version1.0.7 Options AutoRunfalse MutexDcRatMutex_qwqdanchun InstallFolder%AppData% BSoDfalse AntiVMfalse Certificates Cert1MIICMDCCAZmgAwIBAgIVAMhW9cDliVtd2+b6qg9Z4iJDMk5pMA0GCSqGSIb3DQEBDQUAMGQxFTATBgNVBAMMDERjUmF0IFNlcnZlcjETMBEGA1UECwwKcXdxZGFuY2h1bjEcMBoGA1UECgwTRGNSYXQgQnkgcXdxZGFuY2h1bjELMAkGA1UEBwwCU0gxCzAJBgNVBAYTAkNOMB4XDTIzMDQwNDE4NDIyOFoXDTM0MDExMTE4NDIyOFowEDEOMAwGA1UEAwwFRGNSYXQwgZ8wDQYJKoZIhvcNAQEBBQADgY0A... Server_SignatureIumNxnFSZpr2z8ZX4RuUHGlcDVtYw5WrKQjaxQqht2JQK5lEHIN2aFvj2DDgqDaLG1wpjmcNpJlEAyJkDEuatXYzGcc3Haq2yWkaNb1yP6hK4QcHpbhbCtVappacbFekJA4g+b1QNOrG1TXZolq9cn2bKyaQKa0sgEFk+HNVUu8= Keys AES9c91802117ccc9e5fd16958b0efd5013b2061c1d8ffe29472872a05e89dd534f SaltDcRatByqwqdanchun | |||||||||||||||
| (PID) Process: | (2568) aimbot.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2568 | aimbot.exe | 146.70.83.186:1337 | — | M247 Ltd | GB | unknown |
2568 | aimbot.exe | 10.13.106.229:1443 | — | — | — | unknown |