General
-
Target
759eb01f8687aa4ab519ce0b8ada22d7.exe
-
Size
560KB
-
Sample
220706-m1nxksbhgp
-
MD5
759eb01f8687aa4ab519ce0b8ada22d7
-
SHA1
80086dd4bd562df870ed9556248a0a46177e63d7
-
SHA256
0fbd0deb8891b8836c9987f79c0dcf7383ace21dcd7ee8ffcfdf609311af7808
-
SHA512
2ac4cc01afba0ba62db65763f5f3fe9ecfd2e83dbe5a28082d2d61cce92ef37f08e5c0b6f2d7769ff6309f805a3385cf1b4f968ff22e8632b76af3098ee00dc0
Static task
static1
Behavioral task
behavioral1
Sample
759eb01f8687aa4ab519ce0b8ada22d7.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
759eb01f8687aa4ab519ce0b8ada22d7.exe
-
Size
560KB
-
MD5
759eb01f8687aa4ab519ce0b8ada22d7
-
SHA1
80086dd4bd562df870ed9556248a0a46177e63d7
-
SHA256
0fbd0deb8891b8836c9987f79c0dcf7383ace21dcd7ee8ffcfdf609311af7808
-
SHA512
2ac4cc01afba0ba62db65763f5f3fe9ecfd2e83dbe5a28082d2d61cce92ef37f08e5c0b6f2d7769ff6309f805a3385cf1b4f968ff22e8632b76af3098ee00dc0
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Suspicious use of SetThreadContext
-