General
-
Target
8dd5914e40b211d4ce4ec927bac083975e4e1910498bcbf45f1233a755c2f3a7
-
Size
47KB
-
Sample
230307-2aezbacd83
-
MD5
4df29d7678c4533be7a9ad05e4bf752a
-
SHA1
c6ee50bf6f5a8525e73b8394e6646de4b56c0deb
-
SHA256
8dd5914e40b211d4ce4ec927bac083975e4e1910498bcbf45f1233a755c2f3a7
-
SHA512
52861a3bf99ad4be25003952b7802a6f47aea7b335321f2d041426edbfafd84d3f9ef971726214ffd43c737ff7360aa5e1fa595fc3cfbfef1761cb045ac21744
-
SSDEEP
768:aueq1TFBA3VWU1+fhcvmo2qjwU3dmPIwMbhEe0blghZx6Ue7sbKoRTG72BDZ8x:aueq1TFm92m3dPwM9SblghZ4s6Yd8x
Behavioral task
behavioral1
Sample
8dd5914e40b211d4ce4ec927bac083975e4e1910498bcbf45f1233a755c2f3a7.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
PI-004-A
172.104.148.228:6606
fusioncore32023.hopto.org:6606
fusioncore_was_here
-
delay
3
-
install
true
-
install_file
WindowsSettingsHelper.exe
-
install_folder
%AppData%
Extracted
asyncrat
AsyncRAT-Sharp X SiphonFilter 0.5.8B
VERSION 3
ndospjn.ddns.net:4563
SDFSSDFSFSFS()YERSFdaDSWGHIUHERGBIE()RYHEIRUYGBEIRUGYREIUGERGERG
-
delay
3
-
install
true
-
install_file
dmpF4GD3.tmp.scr.exe
-
install_folder
%Temp%
Extracted
asyncrat
0.5.7B
Default
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
systemupdate64.exe
-
install_folder
%AppData%
-
pastebin_config
http://pastebin.com/raw/0vQb3Cug
Targets
-
-
Target
8dd5914e40b211d4ce4ec927bac083975e4e1910498bcbf45f1233a755c2f3a7
-
Size
47KB
-
MD5
4df29d7678c4533be7a9ad05e4bf752a
-
SHA1
c6ee50bf6f5a8525e73b8394e6646de4b56c0deb
-
SHA256
8dd5914e40b211d4ce4ec927bac083975e4e1910498bcbf45f1233a755c2f3a7
-
SHA512
52861a3bf99ad4be25003952b7802a6f47aea7b335321f2d041426edbfafd84d3f9ef971726214ffd43c737ff7360aa5e1fa595fc3cfbfef1761cb045ac21744
-
SSDEEP
768:aueq1TFBA3VWU1+fhcvmo2qjwU3dmPIwMbhEe0blghZx6Ue7sbKoRTG72BDZ8x:aueq1TFm92m3dPwM9SblghZ4s6Yd8x
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
XMRig Miner payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-