General
-
Target
SeroXen.exe
-
Size
158KB
-
Sample
240330-3tdq2aab47
-
MD5
9fbd542a485a60bc5f9dd053c6917b3c
-
SHA1
b02791c1f6d06133b91f047c5131469502247924
-
SHA256
e17aa5e68d9acc532fc49febca4c7072496df5e47183e3d10d8f89b31c160cf5
-
SHA512
f51e3fd84a3d0d059777fcf44a6154a33b6eee94c40065d5cf454a3489230c1daf4ed3c65f134f3ebcf1c024d485c4a270041567932fc9d06d1998a6298a5b3b
-
SSDEEP
3072:YuGkTQaI2ObNc3RnbzgF50mmEuxnetCje3ew33Wv1x:YuGixl3RnbcH0cuxetC+33Wvz
Behavioral task
behavioral1
Sample
SeroXen.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
0.5.8
Async
140.238.91.110:42341
GW7yTStHluEa
-
delay
3
-
install
true
-
install_file
WindowsUpdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
SeroXen.exe
-
Size
158KB
-
MD5
9fbd542a485a60bc5f9dd053c6917b3c
-
SHA1
b02791c1f6d06133b91f047c5131469502247924
-
SHA256
e17aa5e68d9acc532fc49febca4c7072496df5e47183e3d10d8f89b31c160cf5
-
SHA512
f51e3fd84a3d0d059777fcf44a6154a33b6eee94c40065d5cf454a3489230c1daf4ed3c65f134f3ebcf1c024d485c4a270041567932fc9d06d1998a6298a5b3b
-
SSDEEP
3072:YuGkTQaI2ObNc3RnbzgF50mmEuxnetCje3ew33Wv1x:YuGixl3RnbcH0cuxetC+33Wvz
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-