General
-
Target
ngrclub-protected.exe
-
Size
3.0MB
-
Sample
240124-xjwk7sgaap
-
MD5
209ce82914f67632c011132bc09a1584
-
SHA1
eb565f108a63b3f78ea3cefbaec1d845663c671f
-
SHA256
d3a452c7dd9039acac94b60bec2c90d3bb656756ae7e18a50b328d6fe22e80cf
-
SHA512
fa47be79234d6805ce37a37cfe1bbf2792dba42ed60914d7b8fc9905bd59b0e483bbadf0a8abcffab07885eb6ea5dfa4d2271fb24fc8099d268b0549f701be87
-
SSDEEP
49152:LdWnZHdTB1mIkDa1lS5x4hxQJxG9d213ChYfKMjObIOZc/HyVSUwTPGlOVZNB2zg:LdWZHZB1UenSooxGf2CGfKYOvm/SVcjX
Malware Config
Extracted
asyncrat
1.0.7
Versace.WTF
45.128.36.146:8848
fhfsf69fga86gf78525845rt2867752456877777777777777777777
-
delay
1
-
install
true
-
install_file
msedge.exe
-
install_folder
%AppData%
Targets
-
-
Target
ngrclub-protected.exe
-
Size
3.0MB
-
MD5
209ce82914f67632c011132bc09a1584
-
SHA1
eb565f108a63b3f78ea3cefbaec1d845663c671f
-
SHA256
d3a452c7dd9039acac94b60bec2c90d3bb656756ae7e18a50b328d6fe22e80cf
-
SHA512
fa47be79234d6805ce37a37cfe1bbf2792dba42ed60914d7b8fc9905bd59b0e483bbadf0a8abcffab07885eb6ea5dfa4d2271fb24fc8099d268b0549f701be87
-
SSDEEP
49152:LdWnZHdTB1mIkDa1lS5x4hxQJxG9d213ChYfKMjObIOZc/HyVSUwTPGlOVZNB2zg:LdWZHZB1UenSooxGf2CGfKYOvm/SVcjX
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Blocklisted process makes network request
-
Stops running service(s)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-