General
-
Target
f635d6dbb86f7d946250514c9ccb7db0.exe
-
Size
256KB
-
Sample
200709-a2332kptae
-
MD5
f635d6dbb86f7d946250514c9ccb7db0
-
SHA1
f11402b0dba9a9c81399c2f557b11deac2620c55
-
SHA256
25babc8d9be2e6cc3cdd408fac70bea0d9c3f0c3480945d3bcb374c88b6f82c1
-
SHA512
e02ba39e68acd88724acda61ac1feb501a0d070022c22863e7dd2fa2dc160a15d56e302a5ad1ad200d70091098d764c542cdf88d88d917d5f988ae36d80d9d9c
Static task
static1
Behavioral task
behavioral1
Sample
f635d6dbb86f7d946250514c9ccb7db0.exe
Resource
win7
Behavioral task
behavioral2
Sample
f635d6dbb86f7d946250514c9ccb7db0.exe
Resource
win10
Malware Config
Extracted
asyncrat
0.5.7B
null:null
AsyncMutex_6SI8OkPnk
-
aes_key
EfA8oEwdphb1PRVOxTe3AN4wESj6UjIj
-
anti_detection
false
-
autorun
true
-
bdos
false
-
delay
CORONA
-
host
null
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
https://pastebin.com/raw/KVXdCZYr
-
port
null
-
version
0.5.7B
Targets
-
-
Target
f635d6dbb86f7d946250514c9ccb7db0.exe
-
Size
256KB
-
MD5
f635d6dbb86f7d946250514c9ccb7db0
-
SHA1
f11402b0dba9a9c81399c2f557b11deac2620c55
-
SHA256
25babc8d9be2e6cc3cdd408fac70bea0d9c3f0c3480945d3bcb374c88b6f82c1
-
SHA512
e02ba39e68acd88724acda61ac1feb501a0d070022c22863e7dd2fa2dc160a15d56e302a5ad1ad200d70091098d764c542cdf88d88d917d5f988ae36d80d9d9c
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies security service
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-