General
-
Target
ev0lve.exe
-
Size
43.3MB
-
Sample
220825-145amaceh7
-
MD5
302cf996807bbe8cae7e62932a869e4f
-
SHA1
f2156b482cc02f57935547117cb08b57c578e15d
-
SHA256
39f55931d53ae2b48822ef75d2409d313311ae429aea5f320df51d623aebc82e
-
SHA512
e52039dfb62adb3f1af98b3122c192126fba25b0a400b42839ac8c6363d7fdfb16923d8bb3b2483a262c7bd0b9b5d7cd3aa8faa8e5aabc416042bd5797fb1135
-
SSDEEP
786432:MSdhVv6+LSXK4MvJt+Yy22K3Jn76g+NzsszyJ+UfyVmdSKquP+1ttXXZVOob/CWZ:J3mOAYCbN5UfyVQWuP+rJXNbd
Malware Config
Extracted
asyncrat
1.0.7
Default
6.tcp.eu.ngrok.io:1604
6.tcp.eu.ngrok.io:4040
6.tcp.eu.ngrok.io:12320
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
Microsoft.exe
-
install_folder
%AppData%
Targets
-
-
Target
ev0lve.exe
-
Size
43.3MB
-
MD5
302cf996807bbe8cae7e62932a869e4f
-
SHA1
f2156b482cc02f57935547117cb08b57c578e15d
-
SHA256
39f55931d53ae2b48822ef75d2409d313311ae429aea5f320df51d623aebc82e
-
SHA512
e52039dfb62adb3f1af98b3122c192126fba25b0a400b42839ac8c6363d7fdfb16923d8bb3b2483a262c7bd0b9b5d7cd3aa8faa8e5aabc416042bd5797fb1135
-
SSDEEP
786432:MSdhVv6+LSXK4MvJt+Yy22K3Jn76g+NzsszyJ+UfyVmdSKquP+1ttXXZVOob/CWZ:J3mOAYCbN5UfyVQWuP+rJXNbd
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-