General
-
Target
ud.exe
-
Size
261KB
-
Sample
240607-yw8a7sdf44
-
MD5
75fb257a45f68b45c3def64b60db17e0
-
SHA1
83f3d83dbc9549e0ca584d7d079fbede925753dd
-
SHA256
0809625ede2855e52bb46b2a4c78cf33a549a1c20f5470203d7e2b597c05f29f
-
SHA512
4d427b7877059a4e6dcfd5bb0f4db6700de2fe7542d4b7452df482ac2f73905d0725cdeb51bb4a1b74b2e34347bce3692c1ab5021a234f3a208468d7f6f66934
-
SSDEEP
3072:dXytAeE7XyCMrJLwzB8JV1EXeDU1RU3haZYVG/RXytAeE7XyCMrJLwzB8JV1EXeV:V5VCC1zqnU1RWkp5VCC1zqnU1RWk
Static task
static1
Behavioral task
behavioral1
Sample
ud.exe
Resource
win7-20240221-en
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8080
127.0.0.1:18775
127.0.0.1:13297
4.tcp.eu.ngrok.io:8080
4.tcp.eu.ngrok.io:18775
4.tcp.eu.ngrok.io:13297
6.tcp.eu.ngrok.io:8080
6.tcp.eu.ngrok.io:18775
6.tcp.eu.ngrok.io:13297
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_file
explorer.exe
-
install_folder
%AppData%
Targets
-
-
Target
ud.exe
-
Size
261KB
-
MD5
75fb257a45f68b45c3def64b60db17e0
-
SHA1
83f3d83dbc9549e0ca584d7d079fbede925753dd
-
SHA256
0809625ede2855e52bb46b2a4c78cf33a549a1c20f5470203d7e2b597c05f29f
-
SHA512
4d427b7877059a4e6dcfd5bb0f4db6700de2fe7542d4b7452df482ac2f73905d0725cdeb51bb4a1b74b2e34347bce3692c1ab5021a234f3a208468d7f6f66934
-
SSDEEP
3072:dXytAeE7XyCMrJLwzB8JV1EXeDU1RU3haZYVG/RXytAeE7XyCMrJLwzB8JV1EXeV:V5VCC1zqnU1RWkp5VCC1zqnU1RWk
-
Async RAT payload
-
Legitimate hosting services abused for malware hosting/C2
-