General
-
Target
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4
-
Size
1.8MB
-
Sample
221109-ejt39sdeg9
-
MD5
c233f8e5f9b0441782280bb49b98f415
-
SHA1
ddd3476e9d61fc2d707354da50b490dea8f37721
-
SHA256
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4
-
SHA512
f5404661a5349fb33e18eb632b12a6df3b7e735346bec08ee6a848375c9d6d71bd846c472bf19eccb34aa407bf16a0e214ca4ebe58f1460d4b10cf4c6fdc153c
-
SSDEEP
49152:j0OB/3taBrb/TMvO90d7HjmAFd4A64nsfJ4ongXG/jpC3Ohz1:/349m
Static task
static1
Behavioral task
behavioral1
Sample
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
1.0.7 - modded by last
New
nicehash.at:4343
adsasutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleDriver.exe
-
install_folder
%AppData%
Extracted
bitrat
1.38
nicehash.at:6000
-
communication_password
005f16f264f006578c55237781f36898
-
install_dir
JavaHelper
-
install_file
Java.exe
-
tor_process
tor
Targets
-
-
Target
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4
-
Size
1.8MB
-
MD5
c233f8e5f9b0441782280bb49b98f415
-
SHA1
ddd3476e9d61fc2d707354da50b490dea8f37721
-
SHA256
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4
-
SHA512
f5404661a5349fb33e18eb632b12a6df3b7e735346bec08ee6a848375c9d6d71bd846c472bf19eccb34aa407bf16a0e214ca4ebe58f1460d4b10cf4c6fdc153c
-
SSDEEP
49152:j0OB/3taBrb/TMvO90d7HjmAFd4A64nsfJ4ongXG/jpC3Ohz1:/349m
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-