General
-
Target
Inital.bat
-
Size
63KB
-
Sample
240522-xtyhjsdb21
-
MD5
e9319ac7284b6bbadf0200fee286b6c1
-
SHA1
51c30382aa103118937f1a9bf453a8345febafb4
-
SHA256
09d4308c18ecece489a51b7837968bcfc6c1273d83f5c83614bbdd119ccf6961
-
SHA512
73e349b61c285cdb3cfdf41ae9ba166cc0f8e5c7b989bf744f9aa8433baf41ea3a01b46fa9a88cc97fa4ca5d80f57a9dbd8fea631a164566c9e95632c9f3404b
-
SSDEEP
1536:Z6e+aDqc6V/xOtoqfF4OycI/k0xqAD/xtM:Z6aDqpVuoqKL5fkAvM
Static task
static1
Malware Config
Extracted
asyncrat
0.5.8
RATED
147.185.221.17:25565
147.185.221.17:37531
Dudee4vQEqBD
-
delay
3
-
install
false
-
install_file
AnticheatBiner.exe
-
install_folder
%AppData%
Targets
-
-
Target
Inital.bat
-
Size
63KB
-
MD5
e9319ac7284b6bbadf0200fee286b6c1
-
SHA1
51c30382aa103118937f1a9bf453a8345febafb4
-
SHA256
09d4308c18ecece489a51b7837968bcfc6c1273d83f5c83614bbdd119ccf6961
-
SHA512
73e349b61c285cdb3cfdf41ae9ba166cc0f8e5c7b989bf744f9aa8433baf41ea3a01b46fa9a88cc97fa4ca5d80f57a9dbd8fea631a164566c9e95632c9f3404b
-
SSDEEP
1536:Z6e+aDqc6V/xOtoqfF4OycI/k0xqAD/xtM:Z6aDqpVuoqKL5fkAvM
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-