General
-
Target
0491601a5cda328f6712c4b7c2dc2380315a8bcf7e47d9329a23a8e1ee6378e2
-
Size
336KB
-
Sample
220521-pp2emsahhp
-
MD5
784e9402ffaddc245cd4b9ad713f224f
-
SHA1
9df02287c0eb005c45c554aad4f2c979a6e803d0
-
SHA256
0491601a5cda328f6712c4b7c2dc2380315a8bcf7e47d9329a23a8e1ee6378e2
-
SHA512
2806ca69ca1a0fe564c0a9b871b31f8fae56899f7f15f3da868a7a78f8e9f44320418f7355b9de7e3f4ada8a1dcafd593dae3bf349706e0371525fc067fda1e4
Static task
static1
Behavioral task
behavioral1
Sample
Disposable Protective Mask.exe
Resource
win7-20220414-en
Malware Config
Extracted
asyncrat
0.5.6D
TINOTINO
185.165.153.215:6606
uqeolevmck
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Disposable Protective Mask.exe
-
Size
561KB
-
MD5
6f254eb4843ee683a0c43e340bfe8840
-
SHA1
82b24614b10237c4b8ab9b31a860555be00667b7
-
SHA256
82f23154db8360127ad3fbcab71948019b0e2904c1ec65d5045722f6ee91fdce
-
SHA512
2ed7a8a383366eefb4e2fe6d23f97f2ba24b992c315d6cdde6069e2e76910413a77c20b5da71ac74b35e8bfd05f36951225afbca8035b35a82d763d49ff65d19
Score10/10-
CoreEntity .NET Packer
A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-