General
-
Target
bJwE.exe
-
Size
47KB
-
Sample
230202-xs71laee24
-
MD5
a19f3395e7a7f2981eccd6448d6921aa
-
SHA1
09c6a9dbff7f8dbd3c57946e686adedf9b9a1702
-
SHA256
4f23c0742d9a19732acdcc777b4168366d4762b7f9fa553d1dbc62b68378cc97
-
SHA512
9a8dc4c29cea92969e1f2e9974db056f5aa25f9ca46bc70b61da141e964d136ccfbb961b9113de5b984682e7cd89bb16864349075e963c2e0d47ea205161940a
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08YbygePr7DlPlXWvEgK/JnZVc6KN:p96AKWMtKDs4zb1ulPlXWnkJnZVclN
Behavioral task
behavioral1
Sample
bJwE.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
1.0.7
Default
gkAyQRdKkCButk6TyMAZ
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/FcHGaN0M
Targets
-
-
Target
bJwE.exe
-
Size
47KB
-
MD5
a19f3395e7a7f2981eccd6448d6921aa
-
SHA1
09c6a9dbff7f8dbd3c57946e686adedf9b9a1702
-
SHA256
4f23c0742d9a19732acdcc777b4168366d4762b7f9fa553d1dbc62b68378cc97
-
SHA512
9a8dc4c29cea92969e1f2e9974db056f5aa25f9ca46bc70b61da141e964d136ccfbb961b9113de5b984682e7cd89bb16864349075e963c2e0d47ea205161940a
-
SSDEEP
768:p96mxUTILWCaS+DiMtelDSN+iV08YbygePr7DlPlXWvEgK/JnZVc6KN:p96AKWMtKDs4zb1ulPlXWnkJnZVclN
-
Async RAT payload
-
Deletes itself
-
Legitimate hosting services abused for malware hosting/C2
-