General
-
Target
svchost.exe
-
Size
64KB
-
Sample
230331-blm6ysgb25
-
MD5
f97fa46ef53c32b3d35e7eb702cf15ce
-
SHA1
92fcc3d3eea33cf659d0140079364f972867aca2
-
SHA256
23eac34d8e359b2527ed4de7b51a1332fbb6887a6ffff30940af7ccda731de31
-
SHA512
183b5498f946a9ee1c6f3c2b6d70d75b4e1415842c6f54fd427adf8a5579c1b8f803f7bc5f893e28eb16cdc2259aee92df78c15bc8023b078143d4918a5a5477
-
SSDEEP
1536:7/G2Wz1soi1sXsautYViUXObhnE9iqEvjUqT3WIx:7/G2Wz1soi10s/tYV3+bhERk3Vx
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
AsyncRAT
New
websites.vpndns.net:112
AsyncMutex_5552
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
svchost.exe
-
Size
64KB
-
MD5
f97fa46ef53c32b3d35e7eb702cf15ce
-
SHA1
92fcc3d3eea33cf659d0140079364f972867aca2
-
SHA256
23eac34d8e359b2527ed4de7b51a1332fbb6887a6ffff30940af7ccda731de31
-
SHA512
183b5498f946a9ee1c6f3c2b6d70d75b4e1415842c6f54fd427adf8a5579c1b8f803f7bc5f893e28eb16cdc2259aee92df78c15bc8023b078143d4918a5a5477
-
SSDEEP
1536:7/G2Wz1soi1sXsautYViUXObhnE9iqEvjUqT3WIx:7/G2Wz1soi10s/tYV3+bhERk3Vx
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-