General
-
Target
Client.exe
-
Size
47KB
-
Sample
240218-m3y6bshf86
-
MD5
304d41baaa716a6d582877785f93ef68
-
SHA1
a2b16217d6326c54fbd7ca5586519d50ce3e20ca
-
SHA256
760d61c1b76f9a909e2e427ed60c7cc76ebb32246b8aec5459d882a04482b1ea
-
SHA512
2a1f1859bf1ee1ff3be5469d44daf96ba8e6f26e377a6e538e64be815d4e7eb87911b0cbd2cddd3135c2f0e6933151fc47f8aeefa22e7becfa1babb8d38f3a41
-
SSDEEP
768:59n7mxUzILWCaS+Di1xCKzVixM8YbxgeXP9RavEgK/JXZVc6KN:597AKW1xCGLzb+SPTankJXZVclN
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20231129-en
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:16234
6.tcp.eu.ngrok.io:8848
6.tcp.eu.ngrok.io:16234
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
WindowsDefender.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
47KB
-
MD5
304d41baaa716a6d582877785f93ef68
-
SHA1
a2b16217d6326c54fbd7ca5586519d50ce3e20ca
-
SHA256
760d61c1b76f9a909e2e427ed60c7cc76ebb32246b8aec5459d882a04482b1ea
-
SHA512
2a1f1859bf1ee1ff3be5469d44daf96ba8e6f26e377a6e538e64be815d4e7eb87911b0cbd2cddd3135c2f0e6933151fc47f8aeefa22e7becfa1babb8d38f3a41
-
SSDEEP
768:59n7mxUzILWCaS+Di1xCKzVixM8YbxgeXP9RavEgK/JXZVc6KN:597AKW1xCGLzb+SPTankJXZVclN
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-