General
-
Target
bRh5.exe
-
Size
47KB
-
Sample
231102-vnb19aef79
-
MD5
5134c49a07d56216e9d3e4406df03dfc
-
SHA1
96d6186f359ba0e30501f69eb0aba1e378ee888f
-
SHA256
49aed29ad4a75261e3c9e5e1c7d081588d56a9d9094cfafb4298b73cdb42ff2f
-
SHA512
37158c90dbe42e0ef3b96f5d747f548b09a9c58e65d8d6cccafe403a4264f5ee5cbe526d9caf04109f617daed66d46a530c9a748bbb2c3899962b9083ff1fee2
-
SSDEEP
768:996mxUTILWCaS+DiPqMmaCVi/68YbVge+ZiHlvEgK/J7ZVc6KN:996AKWcZvzbyzYHlnkJ7ZVclN
Behavioral task
behavioral1
Sample
bRh5.exe
Resource
win7-20231020-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
bRh5.exe
-
Size
47KB
-
MD5
5134c49a07d56216e9d3e4406df03dfc
-
SHA1
96d6186f359ba0e30501f69eb0aba1e378ee888f
-
SHA256
49aed29ad4a75261e3c9e5e1c7d081588d56a9d9094cfafb4298b73cdb42ff2f
-
SHA512
37158c90dbe42e0ef3b96f5d747f548b09a9c58e65d8d6cccafe403a4264f5ee5cbe526d9caf04109f617daed66d46a530c9a748bbb2c3899962b9083ff1fee2
-
SSDEEP
768:996mxUTILWCaS+DiPqMmaCVi/68YbVge+ZiHlvEgK/J7ZVc6KN:996AKWcZvzbyzYHlnkJ7ZVclN
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-