General
-
Target
Test.exe
-
Size
36.6MB
-
Sample
240223-rk9xbsah63
-
MD5
5c409f380598742b3862f545ea2af8ee
-
SHA1
922b2ff8fcdb2fe01a0025e8902dd7009f31a41b
-
SHA256
ed68e12c60686d99f0d76e05e2dba12679cb267e3812c568eee02a7c804152c1
-
SHA512
5520de63cb069748d00c7815c44b5c61e2ff1bf8dd0160e8536a053d2feae04b0d8c2953920e0b677c7862c9f015157a5fcbca9a7af7af4c934d7c935d095ab9
-
SSDEEP
786432:+94QtstqClKKdQP2j6+s7LWB75zupy3MGY3YuMHJSKmlh:W4QtIHlKKo2qHWB75iaMGaMYKc
Behavioral task
behavioral1
Sample
Test.exe
Resource
win7-20240215-en
Malware Config
Extracted
asyncrat
1.0.7
def
37.18.62.18:8060
era2312swe12-1213rsgdkms23
-
delay
1
-
install
true
-
install_file
CCXProcess.exe
-
install_folder
%Temp%
Targets
-
-
Target
Test.exe
-
Size
36.6MB
-
MD5
5c409f380598742b3862f545ea2af8ee
-
SHA1
922b2ff8fcdb2fe01a0025e8902dd7009f31a41b
-
SHA256
ed68e12c60686d99f0d76e05e2dba12679cb267e3812c568eee02a7c804152c1
-
SHA512
5520de63cb069748d00c7815c44b5c61e2ff1bf8dd0160e8536a053d2feae04b0d8c2953920e0b677c7862c9f015157a5fcbca9a7af7af4c934d7c935d095ab9
-
SSDEEP
786432:+94QtstqClKKdQP2j6+s7LWB75zupy3MGY3YuMHJSKmlh:W4QtIHlKKo2qHWB75iaMGaMYKc
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-