General
-
Target
8397ac0fb7fcd733f9c9909fbe360c5a
-
Size
395KB
-
Sample
240131-gc7f5aecbp
-
MD5
8397ac0fb7fcd733f9c9909fbe360c5a
-
SHA1
8c7db019c022fd67ac9c860c015b3eb2db7f8b90
-
SHA256
2bcf62d414a54316c89e890fbfd85b98ab7d3b7533704d1bd77527cb0da1c60f
-
SHA512
f49af97fb07c0294bc325be2e25d3dec5fce2c4c1baa8145b75080e7b8ee277c30468bdecb032df10b3cb8ad485873a02f8c5f390c3d82bbf5931f1609582bb7
-
SSDEEP
1536:uQLodvXiTCLBVTU8VJHAZhBpflS2oQYU+7gpKTrG7DT+moqMJRxHD3QwcWldHwLv:uQLkLB28ePflOrC7qRtt9ldHwL93pr
Static task
static1
Behavioral task
behavioral1
Sample
8397ac0fb7fcd733f9c9909fbe360c5a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8397ac0fb7fcd733f9c9909fbe360c5a.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
roscript.ddns.net:5353
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
8397ac0fb7fcd733f9c9909fbe360c5a
-
Size
395KB
-
MD5
8397ac0fb7fcd733f9c9909fbe360c5a
-
SHA1
8c7db019c022fd67ac9c860c015b3eb2db7f8b90
-
SHA256
2bcf62d414a54316c89e890fbfd85b98ab7d3b7533704d1bd77527cb0da1c60f
-
SHA512
f49af97fb07c0294bc325be2e25d3dec5fce2c4c1baa8145b75080e7b8ee277c30468bdecb032df10b3cb8ad485873a02f8c5f390c3d82bbf5931f1609582bb7
-
SSDEEP
1536:uQLodvXiTCLBVTU8VJHAZhBpflS2oQYU+7gpKTrG7DT+moqMJRxHD3QwcWldHwLv:uQLkLB28ePflOrC7qRtt9ldHwL93pr
Score10/10-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-