General
-
Target
rtyrryr.exe
-
Size
6KB
-
Sample
221203-27nygshh2t
-
MD5
f853ede612b21de687500cd9892c37ad
-
SHA1
fbb1e62b890b50f1ab552cefb6a7b24db875fbb6
-
SHA256
e1178760d7690fdba91528ff2053a646c84774a721fa554fc94130bd50375ac0
-
SHA512
4de3e875a111cd90eda4c59d554d8eb4001d18e1f2fde173ba74f24a78decbe74e5327654bf30693943bc224f81c728686cd4c2650f36ed8ae47d60a0211c42b
-
SSDEEP
96:9xr79BTaCF5NTcM4tweWvk+PneJtNNtUqGsukdNx2d3oj+rl:9xX9FBFDT4qJvkwnEfNtUqGsukR2dZ
Static task
static1
Behavioral task
behavioral1
Sample
rtyrryr.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
rtyrryr.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
asyncrat
0.5.7B
DefenderSmartScren
217.64.31.3:8437
DefenderSmartScren
-
delay
3
-
install
false
-
install_file
SecurityHealtheurvice.exe
-
install_folder
%AppData%
Targets
-
-
Target
rtyrryr.exe
-
Size
6KB
-
MD5
f853ede612b21de687500cd9892c37ad
-
SHA1
fbb1e62b890b50f1ab552cefb6a7b24db875fbb6
-
SHA256
e1178760d7690fdba91528ff2053a646c84774a721fa554fc94130bd50375ac0
-
SHA512
4de3e875a111cd90eda4c59d554d8eb4001d18e1f2fde173ba74f24a78decbe74e5327654bf30693943bc224f81c728686cd4c2650f36ed8ae47d60a0211c42b
-
SSDEEP
96:9xr79BTaCF5NTcM4tweWvk+PneJtNNtUqGsukdNx2d3oj+rl:9xX9FBFDT4qJvkwnEfNtUqGsukR2dZ
Score10/10-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-