General
-
Target
fr-obf.bat
-
Size
17KB
-
Sample
240522-n38kfafe5w
-
MD5
389078feb0d26c841b905168deaecd15
-
SHA1
e0013a66fad26afbbac701c3fbd6a0d85ddce3c9
-
SHA256
f21b7aec9770dc80d20ac5fd871b6b88b7ba4586c2ae56faf724a23ee64a6193
-
SHA512
ce51959c6d29112e575350013be45f87907edb9dc2c6bc3c8dc566e251a350bc361380202c34874aef71085f745dbf4e4ae4a760f457f49ff5e36f238785d238
-
SSDEEP
192:oZYztAEqvAb5JqjbLoUfSY1PfcLCL6lh2uxHwNy/FDcTjNolW/uw6yfzyKe:oZY5AEqvA5JEoiJ1PfcL1PDwiMVvWKe
Static task
static1
Behavioral task
behavioral1
Sample
fr-obf.bat
Resource
win7-20240508-en
Malware Config
Extracted
http://103.179.189.111/porn.png
Extracted
asyncrat
1.0.7
Default
103.179.189.111:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
fr-obf.bat
-
Size
17KB
-
MD5
389078feb0d26c841b905168deaecd15
-
SHA1
e0013a66fad26afbbac701c3fbd6a0d85ddce3c9
-
SHA256
f21b7aec9770dc80d20ac5fd871b6b88b7ba4586c2ae56faf724a23ee64a6193
-
SHA512
ce51959c6d29112e575350013be45f87907edb9dc2c6bc3c8dc566e251a350bc361380202c34874aef71085f745dbf4e4ae4a760f457f49ff5e36f238785d238
-
SSDEEP
192:oZYztAEqvAb5JqjbLoUfSY1PfcLCL6lh2uxHwNy/FDcTjNolW/uw6yfzyKe:oZY5AEqvA5JEoiJ1PfcL1PDwiMVvWKe
-
Async RAT payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Use of msiexec (install) with remote resource
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-