General
-
Target
4x loader.bat
-
Size
1.5MB
-
Sample
240526-rzwm9aae95
-
MD5
5b956910d7d28f6ee2ccb59d4c7b402f
-
SHA1
e99a814ba0a8824a2bb1625b4e2cb0aa828d26e1
-
SHA256
52aac553901b56007d9b40870447423fef70802593722eebd3a7326635074aaa
-
SHA512
1967ce3eb6344695012c1ebb3c78a2a86396c900783907b7f383bb60a40e622ce52af6b813d3cf17686edae560da6d61462fb1d5f7446114ab9a1c9e61e3f635
-
SSDEEP
24576:f69MXQh3D4FnZFRiMf4lPGj8rDm2Wum/j2EtY5ZYZu9C0AzBVG3e5Ql2jumGP:fwTSh3QG+Y9tNjQ
Static task
static1
Malware Config
Extracted
asyncrat
1.0.7
Default
bit-keeping.gl.at.ply.gg:4444
bit-keeping.gl.at.ply.gg:49417
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4x loader.bat
-
Size
1.5MB
-
MD5
5b956910d7d28f6ee2ccb59d4c7b402f
-
SHA1
e99a814ba0a8824a2bb1625b4e2cb0aa828d26e1
-
SHA256
52aac553901b56007d9b40870447423fef70802593722eebd3a7326635074aaa
-
SHA512
1967ce3eb6344695012c1ebb3c78a2a86396c900783907b7f383bb60a40e622ce52af6b813d3cf17686edae560da6d61462fb1d5f7446114ab9a1c9e61e3f635
-
SSDEEP
24576:f69MXQh3D4FnZFRiMf4lPGj8rDm2Wum/j2EtY5ZYZu9C0AzBVG3e5Ql2jumGP:fwTSh3QG+Y9tNjQ
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-