General
-
Target
2efe493bb7af6e276db22c15df9358e2fc72a6281d08d3bde2050653d8b285a0
-
Size
4.8MB
-
Sample
220521-pm3vpaaggn
-
MD5
1bad0cd2505f7c263a861d6e85cde074
-
SHA1
fa53e8aa6b0f25a7095ac86cbc7792f8603d4928
-
SHA256
2efe493bb7af6e276db22c15df9358e2fc72a6281d08d3bde2050653d8b285a0
-
SHA512
7a528ba4f46572cad00d79cc481648a9c3d3a3189cf09a81231a9b5ceff4d59fd94c4ec3c173eaf924bc2d80d73d42ab39050fa06416a78ac3989495285de1d5
Behavioral task
behavioral1
Sample
76BVN200706awbinformation_PDF.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
76BVN200706awbinformation_PDF.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
asyncrat
0.5.7B
GRACE OVERFLOW
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/Q3bqVVf9
Targets
-
-
Target
76BVN200706awbinformation_PDF.exe
-
Size
5.1MB
-
MD5
1082b9039a4b9fafd5d6c40663bed8a2
-
SHA1
7f9a433442b492d6860dcab52b4aa83bfb495222
-
SHA256
ec4f62108a0efc101539e57198ffffaac7be084e792b43daeb4561881c0fc2f2
-
SHA512
dfdade40ac974165dbff9e0d40be375416a7116f13e6769d366452d352562dcee65a1c7c0bf894e405d9e83a355fdcb7171b0525aaac6c4733d3eb4695efbc41
Score10/10-
Async RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-