General
-
Target
New Purchase Order SSRNSSIQ102-2023.exe
-
Size
787KB
-
Sample
230609-hfr2aabb56
-
MD5
0e6861c721b9342f69eba894703f6484
-
SHA1
6c9b0712a4c249805f2f2f1760cd72cf917aa7c6
-
SHA256
fb037edda6db14f4cc45540ee0719c8ca02cbc7636f48c14b6dca3bd187f3e44
-
SHA512
6beb131306e2ae3b91d62f3630271b6755957f2046870ae4b62313851e98b4a2837053ea86d06da3f91d6b9b8ab81eb7e8bf7ccc26b1cb3cbe6cdf9e7db0dbe8
-
SSDEEP
6144:de/RS6Ugha13DnnTawr+BpIW85aDIamyJ95xuuEHQiljH6gnGJZ1ZnImK:deZB1hXwr+h85pMbxuuEHNe6IZBK
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order SSRNSSIQ102-2023.exe
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
fresh03.ddns.net:45265
fresh03.ddns.net:34110
fresh03.ddns.net:2245
fresh01.ddns.net:45265
fresh01.ddns.net:34110
fresh01.ddns.net:2245
-
delay
3
-
install
true
-
install_file
logs.exe
-
install_folder
%AppData%
Targets
-
-
Target
New Purchase Order SSRNSSIQ102-2023.exe
-
Size
787KB
-
MD5
0e6861c721b9342f69eba894703f6484
-
SHA1
6c9b0712a4c249805f2f2f1760cd72cf917aa7c6
-
SHA256
fb037edda6db14f4cc45540ee0719c8ca02cbc7636f48c14b6dca3bd187f3e44
-
SHA512
6beb131306e2ae3b91d62f3630271b6755957f2046870ae4b62313851e98b4a2837053ea86d06da3f91d6b9b8ab81eb7e8bf7ccc26b1cb3cbe6cdf9e7db0dbe8
-
SSDEEP
6144:de/RS6Ugha13DnnTawr+BpIW85aDIamyJ95xuuEHQiljH6gnGJZ1ZnImK:deZB1hXwr+h85pMbxuuEHNe6IZBK
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-