General
-
Target
7ec73c3cdb2ab4d8ead126d75d8e75e6.exe
-
Size
415KB
-
Sample
230825-jrjpqahh73
-
MD5
7ec73c3cdb2ab4d8ead126d75d8e75e6
-
SHA1
72932cec27122ff030c4e9300026be77c91da7f3
-
SHA256
662373470e1e29fdc50870c0296a21446f2231455ae93dfb9f4339e21d8eaca5
-
SHA512
46a6c5b05bf93d1746ddc9c58f5040832b1c81240580c49831b1c068952eaa2c8111484b7d72c1d51e7688b78a1416f27b8463fb46c3887886d1b2ade0f36f14
-
SSDEEP
12288:7DbFgXY5JxdtIeCP5BRQhgRHf0e9c/j0xMZ2t+4GspUx:3FdtIe+e+RHf0Hx
Static task
static1
Behavioral task
behavioral1
Sample
7ec73c3cdb2ab4d8ead126d75d8e75e6.exe
Resource
win7-20230824-en
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
5.tcp.eu.ngrok.io:18274
AsyncMutex_6SI8OkPnk
-
delay
10
-
install
true
-
install_file
1.exe
-
install_folder
%Temp%
Targets
-
-
Target
7ec73c3cdb2ab4d8ead126d75d8e75e6.exe
-
Size
415KB
-
MD5
7ec73c3cdb2ab4d8ead126d75d8e75e6
-
SHA1
72932cec27122ff030c4e9300026be77c91da7f3
-
SHA256
662373470e1e29fdc50870c0296a21446f2231455ae93dfb9f4339e21d8eaca5
-
SHA512
46a6c5b05bf93d1746ddc9c58f5040832b1c81240580c49831b1c068952eaa2c8111484b7d72c1d51e7688b78a1416f27b8463fb46c3887886d1b2ade0f36f14
-
SSDEEP
12288:7DbFgXY5JxdtIeCP5BRQhgRHf0e9c/j0xMZ2t+4GspUx:3FdtIe+e+RHf0Hx
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-