General
-
Target
bJBm.exe
-
Size
63KB
-
Sample
230213-r3kedsdg97
-
MD5
a91fcb3d082178ef662efa929573458a
-
SHA1
f009343efccfb6fb00684ff425d57680957edd55
-
SHA256
ceb12c810554c6988f7a88335613971616ef832dfd7e9027ae3bdf76f0974ee4
-
SHA512
a71acaf1a7446c843cf6c10e8992f159b93e4e0a32ac5c82faea85dfc7dde588f8df05e617b43e383d5795c09f2f3cf7e77e5c03844fa879e246b54fad0ed18d
-
SSDEEP
1536:HhYBLTM3Ufc4c7VGeeiMl8GbbXwagzDGZZVclN:HhYBLTM3UfcVVfeFmGbbXOezY
Behavioral task
behavioral1
Sample
bJBm.exe
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/H9hfZYSE
Targets
-
-
Target
bJBm.exe
-
Size
63KB
-
MD5
a91fcb3d082178ef662efa929573458a
-
SHA1
f009343efccfb6fb00684ff425d57680957edd55
-
SHA256
ceb12c810554c6988f7a88335613971616ef832dfd7e9027ae3bdf76f0974ee4
-
SHA512
a71acaf1a7446c843cf6c10e8992f159b93e4e0a32ac5c82faea85dfc7dde588f8df05e617b43e383d5795c09f2f3cf7e77e5c03844fa879e246b54fad0ed18d
-
SSDEEP
1536:HhYBLTM3Ufc4c7VGeeiMl8GbbXwagzDGZZVclN:HhYBLTM3UfcVVfeFmGbbXOezY
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-