General
-
Target
systemData.exe
-
Size
63KB
-
Sample
240607-nhx8zafc8z
-
MD5
1041676fa499ccf503bbd83e34bfa723
-
SHA1
ecf580a3883f191aa6884987b7df7d89eae63f92
-
SHA256
6a441a93c71d7a04b5d53a85f078ce40c3a5b151bb6e202b5c5b7e585696bc48
-
SHA512
b6e83249c6c6424d3ffff75a801471933443652313b0e5b8a226e09e26fb5cb9f9601e9818fbdc82d4f1a432df9903f2695da8cf68f622c6de6db45fe06d49ab
-
SSDEEP
1536:HX9xf3ZnKUoXLH1xb7z+/Ubqh95mu0dpqKmY7:HvI7C/Ubq2Gz
Behavioral task
behavioral1
Sample
systemData.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:8080
127.0.0.1:18775
4.tcp.eu.ngrok.io:8080
4.tcp.eu.ngrok.io:18775
-
delay
1
-
install
true
-
install_file
systemData.exe
-
install_folder
%AppData%
Targets
-
-
Target
systemData.exe
-
Size
63KB
-
MD5
1041676fa499ccf503bbd83e34bfa723
-
SHA1
ecf580a3883f191aa6884987b7df7d89eae63f92
-
SHA256
6a441a93c71d7a04b5d53a85f078ce40c3a5b151bb6e202b5c5b7e585696bc48
-
SHA512
b6e83249c6c6424d3ffff75a801471933443652313b0e5b8a226e09e26fb5cb9f9601e9818fbdc82d4f1a432df9903f2695da8cf68f622c6de6db45fe06d49ab
-
SSDEEP
1536:HX9xf3ZnKUoXLH1xb7z+/Ubqh95mu0dpqKmY7:HvI7C/Ubq2Gz
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-