General
-
Target
SOA.exe
-
Size
1.1MB
-
Sample
230106-aztefsdg69
-
MD5
f890903c9b2fa054a4b22b4240870db2
-
SHA1
06ed4e7131287fcf01e49834180567daf9a13240
-
SHA256
a0c77b9f372d94ae8cbc32b27d319491cb65001b12963bc68b96b8caaf10dfa0
-
SHA512
b230749492b8d3ceb0824badc423c163c706df0c464849950523f2bedefa2ed7f50de83ee403611f1c5559f154f0fed7335310d23233701625de65bc09b9e883
-
SSDEEP
12288:xJEPCBEYJmzdicP0bYzJfKMVvS1yIuDBXolPu3fgzHIGEoTCqEUbeSh39W+ll8nO:rCJRVXbe8REgRJrn85cMNd
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win10-20220812-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
ESCANOR2022.LINKPC.NET:6606
ESCANOR2022.LINKPC.NET:7707
ESCANOR2022.LINKPC.NET:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
sqli.exe
-
install_folder
%AppData%
Targets
-
-
Target
SOA.exe
-
Size
1.1MB
-
MD5
f890903c9b2fa054a4b22b4240870db2
-
SHA1
06ed4e7131287fcf01e49834180567daf9a13240
-
SHA256
a0c77b9f372d94ae8cbc32b27d319491cb65001b12963bc68b96b8caaf10dfa0
-
SHA512
b230749492b8d3ceb0824badc423c163c706df0c464849950523f2bedefa2ed7f50de83ee403611f1c5559f154f0fed7335310d23233701625de65bc09b9e883
-
SSDEEP
12288:xJEPCBEYJmzdicP0bYzJfKMVvS1yIuDBXolPu3fgzHIGEoTCqEUbeSh39W+ll8nO:rCJRVXbe8REgRJrn85cMNd
-
Detects Smokeloader packer
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Sets service image path in registry
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook profiles
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-