General
-
Target
146ff96668acfa0b36d30bab42321a2cdeccfa9714c8e1cc832741ff1d5c5d84.zip
-
Size
45KB
-
Sample
221010-jr41nabbb6
-
MD5
9229cd00d9d97a63dfab8afb84f9370b
-
SHA1
1bef52ec851ac8dc0df0d0e8b91d7a756ae1769b
-
SHA256
6be765d9b3531f2c2df05dee6254a3154f0764e2d2ca175346b0e9e2027b4c12
-
SHA512
af90c5d29e6e7cdce39f77251b532297720f5258667a92a9877da679c6dc194fbf47b1c8ff2afb91d2a689b9cec21c039176408da3fa75f623be3ea15dd4fb3b
-
SSDEEP
768:VGaLNLMUnozdlHW1G8rbynTxf+r1grtB46sKtMu7UmyCa3NYUvi5pKJIyu6ykbLg:VGYNwDhlN42xfQ1grz46sKiu7AJ3NYpt
Static task
static1
Malware Config
Extracted
asyncrat
0.5.7B
Default
fresh02.ddns.net:2245
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
logs.exe
-
install_folder
%AppData%
Targets
-
-
Target
146ff96668acfa0b36d30bab42321a2cdeccfa9714c8e1cc832741ff1d5c5d84.js
-
Size
93KB
-
MD5
bf0318f06d90661b7e6a8a4465cef37c
-
SHA1
848359829b1969522d00a72119d3a2d59ac891f2
-
SHA256
146ff96668acfa0b36d30bab42321a2cdeccfa9714c8e1cc832741ff1d5c5d84
-
SHA512
0fc0243d146c2afcdfbc94d439d12a2b18ef9f1d348ef0dee03d6b46fa4435178ae726b35fa6811f37a4453edafd85fc2374c33d723120862be109816f65ab0d
-
SSDEEP
1536:JUkTxiUoAcTzClzG6JhZgLQZNSZ+ufVkx1JknLYZZh/Myw3IY/p+/:GAcCpdeQZNW2kkJ/Ank/
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-