General
-
Target
Infected.exe
-
Size
63KB
-
Sample
231022-v5avhsbc4t
-
MD5
717dc78094e7b5c0fd501ace3341bfdc
-
SHA1
dfd728fa410cd296b37b9d8c04ad8bad3f9144cd
-
SHA256
ef43dced53ef25f2aca977c3c7417bf5b11c64129c8bc582aad7c292f73198d4
-
SHA512
98a2e5132057c2a203a0b4f817f014ec5544cd1880571dd62c7dc3bf74e58ffe4e018c63aaa6cd5f21401c60110bd501e97e51c0fa3a33d10dcbab70fc900ced
-
SSDEEP
768:VKO0JDEIM78K/fC8A+XOyazcBRL5JTk1+T4KSBGHmDbD/ph0oXDq3xWZD/0+Su7V:3VIGn1dSJYUbdh9DqhWpau7dpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20231020-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3232
127.0.0.1:12956
127.0.0.1:11088
2.tcp.eu.ngrok.io:3232
2.tcp.eu.ngrok.io:12956
2.tcp.eu.ngrok.io:11088
6.tcp.eu.ngrok.io:3232
6.tcp.eu.ngrok.io:12956
6.tcp.eu.ngrok.io:11088
比sQ比kMczl西F开zeZR吉勒迪E
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
717dc78094e7b5c0fd501ace3341bfdc
-
SHA1
dfd728fa410cd296b37b9d8c04ad8bad3f9144cd
-
SHA256
ef43dced53ef25f2aca977c3c7417bf5b11c64129c8bc582aad7c292f73198d4
-
SHA512
98a2e5132057c2a203a0b4f817f014ec5544cd1880571dd62c7dc3bf74e58ffe4e018c63aaa6cd5f21401c60110bd501e97e51c0fa3a33d10dcbab70fc900ced
-
SSDEEP
768:VKO0JDEIM78K/fC8A+XOyazcBRL5JTk1+T4KSBGHmDbD/ph0oXDq3xWZD/0+Su7V:3VIGn1dSJYUbdh9DqhWpau7dpqKmY7
-
Async RAT payload
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-