General
-
Target
871f23d521f271b63ea5d3041e097cc5.exe
-
Size
5KB
-
Sample
221113-vwzghsfb7x
-
MD5
871f23d521f271b63ea5d3041e097cc5
-
SHA1
33c118c290f67790a188d523c8afc5c3159de978
-
SHA256
697e12598f923f1b5dcf2d81dc8db9cd944977cfcb9687575307118181f7c43e
-
SHA512
a39a6521e1e6db0c8facce2d773a15c6520bfe12f694273d30b187cb534a89c65e776341431ef15ab7fb7a63cbade578caeb2e718821aba82cc4c6cc4e0de271
-
SSDEEP
96:jf79xkCFvY5c/bUquGm5tlNtUqrGueGCd3oj8Erl:n9xPFg5AUquxXNtUqrlCdG
Static task
static1
Behavioral task
behavioral1
Sample
871f23d521f271b63ea5d3041e097cc5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
871f23d521f271b63ea5d3041e097cc5.exe
Resource
win10v2004-20220901-en
Malware Config
Extracted
asyncrat
0.5.7B
System Guard Runtime
85.105.88.221:2531
System Guard Runtime
-
delay
3
-
install
false
-
install_file
System Guard Runtime
-
install_folder
%AppData%
Targets
-
-
Target
871f23d521f271b63ea5d3041e097cc5.exe
-
Size
5KB
-
MD5
871f23d521f271b63ea5d3041e097cc5
-
SHA1
33c118c290f67790a188d523c8afc5c3159de978
-
SHA256
697e12598f923f1b5dcf2d81dc8db9cd944977cfcb9687575307118181f7c43e
-
SHA512
a39a6521e1e6db0c8facce2d773a15c6520bfe12f694273d30b187cb534a89c65e776341431ef15ab7fb7a63cbade578caeb2e718821aba82cc4c6cc4e0de271
-
SSDEEP
96:jf79xkCFvY5c/bUquGm5tlNtUqrGueGCd3oj8Erl:n9xPFg5AUquxXNtUqrlCdG
Score10/10-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-