General
-
Target
59e4212b84a36744e19bf788f29ad35fec361b80bc92468f9b658346cf1532a6
-
Size
2.2MB
-
Sample
240514-nre4raeb78
-
MD5
027866e4d4d7411f588991ecb31e98b4
-
SHA1
24d25e65d124ca369baae0246109ccaca0eab5ba
-
SHA256
59e4212b84a36744e19bf788f29ad35fec361b80bc92468f9b658346cf1532a6
-
SHA512
bac543df234f0e20dfb3f71594c55365333222c3594fe12cd0c0178b5ac9c4cdd96170c0bb569108f53b8316f2af1bf96b939f285423b41023b7f492a37297ee
-
SSDEEP
49152:tXcTEXpwNexYMzZf47a80FH2g4hQOlDI292re9nseWQI:tXcGlxrZf4u8Jnh2CnsUI
Static task
static1
Behavioral task
behavioral1
Sample
369be61aca46750085c842147909f80c8f938555071adeaceac6727bfcf74186.exe
Resource
win7-20240508-en
Malware Config
Extracted
asyncrat
0.5.8
Default
5512.sytes.net:6606
5512.sytes.net:7707
5512.sytes.net:8808
95.211.208.153:6606
95.211.208.153:7707
95.211.208.153:8808
Llg9a02PERRO
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
369be61aca46750085c842147909f80c8f938555071adeaceac6727bfcf74186.exe
-
Size
2.3MB
-
MD5
a717a432c558f56c46709d6d3ec9837f
-
SHA1
ceda052be2519383085089a41c422ce2b1400a46
-
SHA256
369be61aca46750085c842147909f80c8f938555071adeaceac6727bfcf74186
-
SHA512
e859810a198b8b946581ed6197b1154856e736687dd593d383dc952a3afd597ed6b5a631a8e6b2228a425b809b772457e6e10e0ca6f68cd8f0a8cc637a81132c
-
SSDEEP
49152:T+GJaXbo4IKA2WN4M63n4dHzCJYU6Mm4/4w2RAObR8XlZrzyiko:TboxWN4UHzCJYCmX5w1ZXyik
-
Detect ZGRat V1
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-