General
-
Target
AsyncClient.exe
-
Size
45KB
-
Sample
230605-scshrahc39
-
MD5
11c12e50d5c5b0ae6578f770bfb41671
-
SHA1
87c61e6cad8bf6be174e087784bc5f204648ebe7
-
SHA256
e2be314cb5392f83e23694be4e43326f746e0067012a5f423d72b2ecc3bb1575
-
SHA512
b9c0a081c9c2efb87fc34877d508d0bc7a0504882fd04716535cfb6cea3e5dfe64e7ea834f444903de3f334d625f3a45c58508d68c6ee9853dd60d13e10f463a
-
SSDEEP
768:ju0OVTBRlc6nWUbmelmo2qjrKjGKG6PIyzjbFgX3i9PjHrVFvyrLxBDZjx:ju0OVTBnck26KYDy3bCXSpjHrVdyrrdd
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:15491
127.0.0.1:8080
195.78.54.247:15491
195.78.54.247:8080
2.tcp.eu.ngrok.io:15491
2.tcp.eu.ngrok.io:8080
-
delay
3
-
install
true
-
install_file
awdawd.exe
-
install_folder
%AppData%
Targets
-
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
11c12e50d5c5b0ae6578f770bfb41671
-
SHA1
87c61e6cad8bf6be174e087784bc5f204648ebe7
-
SHA256
e2be314cb5392f83e23694be4e43326f746e0067012a5f423d72b2ecc3bb1575
-
SHA512
b9c0a081c9c2efb87fc34877d508d0bc7a0504882fd04716535cfb6cea3e5dfe64e7ea834f444903de3f334d625f3a45c58508d68c6ee9853dd60d13e10f463a
-
SSDEEP
768:ju0OVTBRlc6nWUbmelmo2qjrKjGKG6PIyzjbFgX3i9PjHrVFvyrLxBDZjx:ju0OVTBnck26KYDy3bCXSpjHrVdyrrdd
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-