General
-
Target
Infected.exe
-
Size
63KB
-
Sample
240627-xel6zaxbpn
-
MD5
c38ad68d1e9dd737deae1e0bcc1f1d0d
-
SHA1
98093374e89a28bf56e620ed2d7487af307bd0c1
-
SHA256
b8e339416fee9d765edf4bdf4c80b2435842cb7af093e55d5d341f6293b797df
-
SHA512
bc92a0588440f82c2b6cfde89352dc1368e013c3ec2d4ae526b7e44173d4d33cc969df3f58f9fb980e875c3591889f76ca5dcc65089dd56f1dafaffbbc245b26
-
SSDEEP
768:Qv0M2UM/978aQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oX6E6kaq+MCSu0dph:b1/k/dSJYUbdh9lh+M1u0dpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
asyncrat
Default
during-goto.gl.at.ply.gg:45478
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
c38ad68d1e9dd737deae1e0bcc1f1d0d
-
SHA1
98093374e89a28bf56e620ed2d7487af307bd0c1
-
SHA256
b8e339416fee9d765edf4bdf4c80b2435842cb7af093e55d5d341f6293b797df
-
SHA512
bc92a0588440f82c2b6cfde89352dc1368e013c3ec2d4ae526b7e44173d4d33cc969df3f58f9fb980e875c3591889f76ca5dcc65089dd56f1dafaffbbc245b26
-
SSDEEP
768:Qv0M2UM/978aQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oX6E6kaq+MCSu0dph:b1/k/dSJYUbdh9lh+M1u0dpqKmY7
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Renames multiple (3152) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Sets desktop wallpaper using registry
-