General
-
Target
Roblox_Cheeto.exe
-
Size
23.8MB
-
Sample
240119-zz32bsecc4
-
MD5
6df7d995cc1e788f664c9124bec5a18b
-
SHA1
25a48cfe4055efe478b4dd721154deee5fa484ba
-
SHA256
c41aea47fee91831786387335132804ad54d5c22031700cb3dc8f998e685000c
-
SHA512
967188dbf48ef862aa66d267f84e890d7adbaf35982df36c860b1519ebe81bbc92d6ef688e5818f041376fcca4cfc1757b4ada0f4780483199e31ab6674e7890
-
SSDEEP
393216:Gvu7L/D7YC+pO5xzKcPmDfDYQ4MpfaMPg5R3ms6y8ovfJuDq38ch4NF:GvCLnYC+knz2bUQ4uf9Pg5tms6yKqMDF
Malware Config
Extracted
asyncrat
1.0.7
def
37.18.62.18:8060
era2312swe12-1213rsgdkms23
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
Targets
-
-
Target
Roblox_Cheeto.exe
-
Size
23.8MB
-
MD5
6df7d995cc1e788f664c9124bec5a18b
-
SHA1
25a48cfe4055efe478b4dd721154deee5fa484ba
-
SHA256
c41aea47fee91831786387335132804ad54d5c22031700cb3dc8f998e685000c
-
SHA512
967188dbf48ef862aa66d267f84e890d7adbaf35982df36c860b1519ebe81bbc92d6ef688e5818f041376fcca4cfc1757b4ada0f4780483199e31ab6674e7890
-
SSDEEP
393216:Gvu7L/D7YC+pO5xzKcPmDfDYQ4MpfaMPg5R3ms6y8ovfJuDq38ch4NF:GvCLnYC+knz2bUQ4uf9Pg5tms6yKqMDF
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-