General
-
Target
COPY.IMG
-
Size
1.7MB
-
Sample
230324-x888lagh44
-
MD5
89a85931886111cbb8dde779b5498562
-
SHA1
43a36d3020f4ca4747bb5671cebd04967ac7eb10
-
SHA256
e850d01470445c2d1aeea4694ef6ca85e8417a5fdd867da5750d24d3e14e0834
-
SHA512
4ecdcfd1faddd8a5514c4e4467cd8b4f74503fa4d89c59118542366dee89bffeb82c0d3745d06b8227275769d2af6c440f34787c38b9c1ec1495c07823d40058
-
SSDEEP
24576:xa+L5JM0ZZN8uX7QHUEjrgVo+ETCmqba0W+Tuu4gmmRt1ZGj:s+hjrX7Q0Ej4on23nTuu4gXR5G
Static task
static1
Behavioral task
behavioral1
Sample
COPY.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
asyncgeneration1.duckdns.org:4404
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
COPY.EXE
-
Size
1.1MB
-
MD5
520ba96d18722d0d6dcc2f0250d52998
-
SHA1
b2db2f9fa0fd3a2c74ef0b10dc684737eac9f3d9
-
SHA256
ba4ffe8c2d64162b9f149242ecb7309a35886d05f5360da9e3e91a261a68c2ae
-
SHA512
44510d3088c495e49c0f3c71defaf7b244146424413a6432ed2f424b9f965b762683d497b697ab240eb10dead17de77c7abd1cd38727e92762ccae4aff444977
-
SSDEEP
24576:Ca+L5JM0ZZN8uX7QHUEjrgVo+ETCmqba0W+Tuu4gmmRt1ZGj:X+hjrX7Q0Ej4on23nTuu4gXR5G
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-