General
-
Target
AsyncClient.exe
-
Size
52KB
-
Sample
240616-1s387atfjk
-
MD5
f5a2b23f785fb2eee6724b41b812b206
-
SHA1
4d9142e9a7280e4df3ddf309c253531b0aa66b2f
-
SHA256
d7c2f3e3d806f37f3b511e8a0ade1b000b30761bf3f96adc92235e134387b2ce
-
SHA512
39c5b0ebf80b77b5b65a224e9e069cb1407d362149ee9478c83f3fb0d412bc462804e2f63b0a7579844dee9abb47a714b5b550d554fe9ef4d26f76b75f84c0e4
-
SSDEEP
1536:GuK59THfe2nElVmsxQhcbZm+M+7wbDjd31YGqMx:GuK3THfe2iVmsxQhcbZfM+SILMx
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240611-en
Malware Config
Extracted
asyncrat
0.5.8
Default
6knTUdMwFO0b
-
delay
3
-
install
true
-
install_file
vortext.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/s14cUU5G
Targets
-
-
Target
AsyncClient.exe
-
Size
52KB
-
MD5
f5a2b23f785fb2eee6724b41b812b206
-
SHA1
4d9142e9a7280e4df3ddf309c253531b0aa66b2f
-
SHA256
d7c2f3e3d806f37f3b511e8a0ade1b000b30761bf3f96adc92235e134387b2ce
-
SHA512
39c5b0ebf80b77b5b65a224e9e069cb1407d362149ee9478c83f3fb0d412bc462804e2f63b0a7579844dee9abb47a714b5b550d554fe9ef4d26f76b75f84c0e4
-
SSDEEP
1536:GuK59THfe2nElVmsxQhcbZm+M+7wbDjd31YGqMx:GuK3THfe2iVmsxQhcbZfM+SILMx
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-