General
-
Target
bKkN.exe
-
Size
63KB
-
Sample
230306-fsjvbsag69
-
MD5
23318ff8a9a2197e0a3bb6fe0263c1de
-
SHA1
d2e5a5f41bffb1ee1ae07c46f9198d7c0f580abb
-
SHA256
c83405cf2fad1c0adeac90b9b100803df52024c56ec93eef9f2f6e9bd14ca4da
-
SHA512
ead93778401820eb525f1c7ca6901fa1c2d06e51015ab929ee53a307b87a097f2fa7f0fc125dbb7e2b249ffb97e10b14b9f35f3255a3006fcf2f291e7e8e8858
-
SSDEEP
1536:PhYBLTM3Ufc4c7V1tHzLPgbbSwRiTt+tGhZVclN:PhYBLTM3UfcVVjgbbSkiTt+kzY
Behavioral task
behavioral1
Sample
bKkN.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/deuWLgNd
Targets
-
-
Target
bKkN.exe
-
Size
63KB
-
MD5
23318ff8a9a2197e0a3bb6fe0263c1de
-
SHA1
d2e5a5f41bffb1ee1ae07c46f9198d7c0f580abb
-
SHA256
c83405cf2fad1c0adeac90b9b100803df52024c56ec93eef9f2f6e9bd14ca4da
-
SHA512
ead93778401820eb525f1c7ca6901fa1c2d06e51015ab929ee53a307b87a097f2fa7f0fc125dbb7e2b249ffb97e10b14b9f35f3255a3006fcf2f291e7e8e8858
-
SSDEEP
1536:PhYBLTM3Ufc4c7V1tHzLPgbbSwRiTt+tGhZVclN:PhYBLTM3UfcVVjgbbSkiTt+kzY
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-