General
-
Target
4X_Tweaker.zip
-
Size
1.1MB
-
Sample
240529-cwtxxsff97
-
MD5
f8ae08b86ee9ab5b5dd6420eeb9a7347
-
SHA1
369f02973c62aff9c75bc9944167ba9bc8daeda7
-
SHA256
113ebdddff838d79baf521ff514882a746d23ae2a3c49ca3851e0a11933b485f
-
SHA512
f7ad90b4467bff6bf284df07e34f0f5f185c1100ac5821ca057d47ea318254bfcc806f062445f16298ef3c43fb947cba9e77a60bd0613a52b24f12698e8368f2
-
SSDEEP
24576:QKcj0IbprYBPCOAMdjJfMZl2+Ead206nvgl5eQ4txhW:Qj0QpmCOhtCn2D0644x4
Static task
static1
Behavioral task
behavioral1
Sample
4X Tweaker/4x Tweaker.bat
Resource
win7-20240508-en
Malware Config
Extracted
asyncrat
1.0.7
Default
bit-keeping.gl.at.ply.gg:4444
bit-keeping.gl.at.ply.gg:49417
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
4X Tweaker/4x Tweaker.bat
-
Size
1.5MB
-
MD5
5b956910d7d28f6ee2ccb59d4c7b402f
-
SHA1
e99a814ba0a8824a2bb1625b4e2cb0aa828d26e1
-
SHA256
52aac553901b56007d9b40870447423fef70802593722eebd3a7326635074aaa
-
SHA512
1967ce3eb6344695012c1ebb3c78a2a86396c900783907b7f383bb60a40e622ce52af6b813d3cf17686edae560da6d61462fb1d5f7446114ab9a1c9e61e3f635
-
SSDEEP
24576:f69MXQh3D4FnZFRiMf4lPGj8rDm2Wum/j2EtY5ZYZu9C0AzBVG3e5Ql2jumGP:fwTSh3QG+Y9tNjQ
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-