General
-
Target
3730cde00a18eb51a69cec2c0f7fec25.exe
-
Size
48KB
-
Sample
221223-ewyxzsah9w
-
MD5
3730cde00a18eb51a69cec2c0f7fec25
-
SHA1
e1e674276906eeb2edbc3def8d5b29d30e3ea860
-
SHA256
5a55e8151e99ae52f6fb48e25cdf6d7d2fc6e531b6050a250fc4f53d480aa3ac
-
SHA512
5ca253deebcd29f4473a79c0a485d6eb8995f51a6831a19e547da57c99fe4bd9ee59a0cf44c3be5635225e7abbaef7f04ed716bbeeaec8e55da7029bb7c4b09b
-
SSDEEP
768:j5F603LoILkWAt+jipNRipp8YblgyDPhvEgK/JzZVc6KN:j5F6RtpNWzbiWnkJzZVclN
Behavioral task
behavioral1
Sample
3730cde00a18eb51a69cec2c0f7fec25.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
SystemUI.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/AjHdtULH
Targets
-
-
Target
3730cde00a18eb51a69cec2c0f7fec25.exe
-
Size
48KB
-
MD5
3730cde00a18eb51a69cec2c0f7fec25
-
SHA1
e1e674276906eeb2edbc3def8d5b29d30e3ea860
-
SHA256
5a55e8151e99ae52f6fb48e25cdf6d7d2fc6e531b6050a250fc4f53d480aa3ac
-
SHA512
5ca253deebcd29f4473a79c0a485d6eb8995f51a6831a19e547da57c99fe4bd9ee59a0cf44c3be5635225e7abbaef7f04ed716bbeeaec8e55da7029bb7c4b09b
-
SSDEEP
768:j5F603LoILkWAt+jipNRipp8YblgyDPhvEgK/JzZVc6KN:j5F6RtpNWzbiWnkJzZVclN
-
Async RAT payload
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-