General
-
Target
FACTURE_.zip
-
Size
578B
-
Sample
220719-r5ab7sega7
-
MD5
38fe63b765f5751372cc3ede1ed452be
-
SHA1
d508be1f87986fc0b104b22253908f67bf915944
-
SHA256
575e4be09039061ce25c80c7a2c922955e2b8a2b18aa62924985a81b024a63ad
-
SHA512
5a01250a8fd1695087e3098df42ef3c3a9c2a13b4cd980c4ee221e0b393b4b6c0095d2fe70a10e54a7a9613fc013623e5c9999d402290ff854f937e55dcc2d7a
Static task
static1
Behavioral task
behavioral1
Sample
FACTURE_.lnk
Resource
win7-20220718-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
secureyourdataarea1.duckdns.org:56390
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
FACTURE_.LNK
-
Size
1012B
-
MD5
60cddf458ccce0249bc3654f282f7b2e
-
SHA1
19a6ab379f925509d7cc36524c716877f4a268a0
-
SHA256
b0cf721309f7ea1684e2593a3e3c98f080146274432f39c9e2d2982ba1c9da95
-
SHA512
cd86c8e423ad3eaad92e67241896976c5e02ecea5d0c2dafef08e17eb6786fae0682d5bd0e59897b06faf06a3cef4a3883c03331c450574ae753bba6477bda91
-
Detect Neshta payload
-
Modifies system executable filetype association
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-