General
-
Target
Copy.exe
-
Size
1.1MB
-
Sample
230324-x89jcsgh45
-
MD5
520ba96d18722d0d6dcc2f0250d52998
-
SHA1
b2db2f9fa0fd3a2c74ef0b10dc684737eac9f3d9
-
SHA256
ba4ffe8c2d64162b9f149242ecb7309a35886d05f5360da9e3e91a261a68c2ae
-
SHA512
44510d3088c495e49c0f3c71defaf7b244146424413a6432ed2f424b9f965b762683d497b697ab240eb10dead17de77c7abd1cd38727e92762ccae4aff444977
-
SSDEEP
24576:Ca+L5JM0ZZN8uX7QHUEjrgVo+ETCmqba0W+Tuu4gmmRt1ZGj:X+hjrX7Q0Ej4on23nTuu4gXR5G
Static task
static1
Behavioral task
behavioral1
Sample
Copy.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
asyncgeneration1.duckdns.org:4404
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Copy.exe
-
Size
1.1MB
-
MD5
520ba96d18722d0d6dcc2f0250d52998
-
SHA1
b2db2f9fa0fd3a2c74ef0b10dc684737eac9f3d9
-
SHA256
ba4ffe8c2d64162b9f149242ecb7309a35886d05f5360da9e3e91a261a68c2ae
-
SHA512
44510d3088c495e49c0f3c71defaf7b244146424413a6432ed2f424b9f965b762683d497b697ab240eb10dead17de77c7abd1cd38727e92762ccae4aff444977
-
SSDEEP
24576:Ca+L5JM0ZZN8uX7QHUEjrgVo+ETCmqba0W+Tuu4gmmRt1ZGj:X+hjrX7Q0Ej4on23nTuu4gXR5G
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-