General
-
Target
generator.exe
-
Size
23.0MB
-
Sample
231012-bjcx7seh2s
-
MD5
2e11e2c532629a74cceb1b85e91d44b3
-
SHA1
a7b785e31ce6228d66834b64b6ad6295c33dc5eb
-
SHA256
0f8467fc257fde33ed91a4437303227c1ecbfeb6838b37c77d6a990819ea36da
-
SHA512
9b53cb953aef1baf3e7bfef05e9a5ceaeb715b695dc8af5036cbe274f41bdfe85006f4d58e4f5e46ed1d37791e38ad1ed3de2c01814af2cce03684135228eb4b
-
SSDEEP
393216:WFQtstvdqEr7M5liRdQJlEwF3MnG3otl53oaeqr5Ak1eDBTW3WTseO5J:EQtstVn7M5lkdQ13MGYNxyhBT15y
Behavioral task
behavioral1
Sample
generator.exe
Resource
win7-20230831-en
Malware Config
Extracted
asyncrat
1.0.7
def
37.18.62.18:8060
era2312swe12-1213rsgdkms23
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
Targets
-
-
Target
generator.exe
-
Size
23.0MB
-
MD5
2e11e2c532629a74cceb1b85e91d44b3
-
SHA1
a7b785e31ce6228d66834b64b6ad6295c33dc5eb
-
SHA256
0f8467fc257fde33ed91a4437303227c1ecbfeb6838b37c77d6a990819ea36da
-
SHA512
9b53cb953aef1baf3e7bfef05e9a5ceaeb715b695dc8af5036cbe274f41bdfe85006f4d58e4f5e46ed1d37791e38ad1ed3de2c01814af2cce03684135228eb4b
-
SSDEEP
393216:WFQtstvdqEr7M5liRdQJlEwF3MnG3otl53oaeqr5Ak1eDBTW3WTseO5J:EQtstVn7M5lkdQ13MGYNxyhBT15y
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-