General
-
Target
yuHJeufffffff8737uh3uHIE.ps1
-
Size
4KB
-
Sample
220911-kepwmsfagr
-
MD5
7d89d808c112fcacd605d6e2f7880bc0
-
SHA1
f558936651ec6b68b901ec5a9d393bf010ba3bbe
-
SHA256
e1ec18d812cd23784d48713517923d54466d6cdb965e145a84dcad71fe34fa3f
-
SHA512
07722d34b05d7a7fbe3d4d7f86d1b0b5401564ea4c4e5014f1bec1240c60a2e286cdcc491c3ab99eff03354921824655ae4c46575252120fd811ccca883f2cdb
-
SSDEEP
96:+HLGX17KgHsAXINxdw231em/UmdSO3N+SWt2/Km7W2ODWXOOVOhi+PLK:eGFShemcm8Od+SY2ym7W2ODW+OVOhi+e
Static task
static1
Behavioral task
behavioral1
Sample
yuHJeufffffff8737uh3uHIE.ps1
Resource
win7-20220812-en
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=1OJfbJ_dhQBde1xgPcrCZtuc4R0yW7q9h
Extracted
https://drive.google.com/uc?export=download&id=1NFPW2Ow39jmb088Vm7c4Lh2mJ767F4nH
Extracted
asyncrat
1.0.7
Default
zerocool888.duckdns.org:8848
zerocool888.duckdns.org:8898
DcRatMutex_imlegion
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
yuHJeufffffff8737uh3uHIE.ps1
-
Size
4KB
-
MD5
7d89d808c112fcacd605d6e2f7880bc0
-
SHA1
f558936651ec6b68b901ec5a9d393bf010ba3bbe
-
SHA256
e1ec18d812cd23784d48713517923d54466d6cdb965e145a84dcad71fe34fa3f
-
SHA512
07722d34b05d7a7fbe3d4d7f86d1b0b5401564ea4c4e5014f1bec1240c60a2e286cdcc491c3ab99eff03354921824655ae4c46575252120fd811ccca883f2cdb
-
SSDEEP
96:+HLGX17KgHsAXINxdw231em/UmdSO3N+SWt2/Km7W2ODWXOOVOhi+PLK:eGFShemcm8Od+SY2ym7W2ODW+OVOhi+e
-
Async RAT payload
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-