General
-
Target
sample.exe
-
Size
194KB
-
Sample
230324-wap7dsgc87
-
MD5
76bea7506af30bdecc70c3d361819f28
-
SHA1
4a07972df9558c3bcfc932997d86453d9006ddbb
-
SHA256
06c73da1c0fdbb10efa56ee3a0fb13685c4b395e4aa9008024c657601f3960b3
-
SHA512
9815ab55d978a0c1974b29c82eff2b69d770a77fbbf157d8b3df807f31393de4f3a980460e24e4b2f62628ab36de95caf79e28fc0b21e9684e01762433549e30
-
SSDEEP
3072:euK0THf52i3H3bvOoAtLYJTlG/OwWREQjd2x:euK+cC3bjAaTc
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
Azazel
azazelxd.duckdns.org:5555
127.0.0.1:5555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
sample.exe
-
Size
194KB
-
MD5
76bea7506af30bdecc70c3d361819f28
-
SHA1
4a07972df9558c3bcfc932997d86453d9006ddbb
-
SHA256
06c73da1c0fdbb10efa56ee3a0fb13685c4b395e4aa9008024c657601f3960b3
-
SHA512
9815ab55d978a0c1974b29c82eff2b69d770a77fbbf157d8b3df807f31393de4f3a980460e24e4b2f62628ab36de95caf79e28fc0b21e9684e01762433549e30
-
SSDEEP
3072:euK0THf52i3H3bvOoAtLYJTlG/OwWREQjd2x:euK+cC3bjAaTc
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-