General
-
Target
final2.EXE
-
Size
31.4MB
-
Sample
240528-taflvaag91
-
MD5
5ef5f3ba516eb07f97a9d6b45d4eb963
-
SHA1
cd02235b4462f408d3477226b279ffb997dccb31
-
SHA256
6edfa70a7cd1bde8485868cafb2593fe5bb92a1bac38c5aac3cba2b6a39e0e1c
-
SHA512
3fb72042e6532e63280d59abfa775dbecc6e93ca2fb8f457ff87efdd5ac05342230892533e593319a8bcc6889766c16efd82b8a209e1dc8ec3f8b202582871ca
-
SSDEEP
786432:srk0h2xZlpTWI2gwkYuKuwE0AsSOsUJJyt5iY/G:s5wxZnTZlwkVKuwErFUm
Static task
static1
Behavioral task
behavioral1
Sample
final2.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
0.5.8
Default
91.92.241.69:5555
WZl6sjIAcmXI
-
delay
3
-
install
true
-
install_file
AMD Update Manager.exe
-
install_folder
%AppData%
Targets
-
-
Target
final2.EXE
-
Size
31.4MB
-
MD5
5ef5f3ba516eb07f97a9d6b45d4eb963
-
SHA1
cd02235b4462f408d3477226b279ffb997dccb31
-
SHA256
6edfa70a7cd1bde8485868cafb2593fe5bb92a1bac38c5aac3cba2b6a39e0e1c
-
SHA512
3fb72042e6532e63280d59abfa775dbecc6e93ca2fb8f457ff87efdd5ac05342230892533e593319a8bcc6889766c16efd82b8a209e1dc8ec3f8b202582871ca
-
SSDEEP
786432:srk0h2xZlpTWI2gwkYuKuwE0AsSOsUJJyt5iY/G:s5wxZnTZlwkVKuwErFUm
-
Async RAT payload
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-