Resubmissions
12-07-2024 05:11
240712-fvphlascrf 10General
-
Target
updater.exe
-
Size
58KB
-
Sample
240712-fvphlascrf
-
MD5
ee5b9ebce290a31f433d2f0a7c0a68c7
-
SHA1
bf43d58541c0414d688c32a3e5ad6e26adb61139
-
SHA256
caf642fb3b0b025f018be00082dfc2c068a57c75fb0f1efa63e04b9ab0f4e654
-
SHA512
36aa1ca70e064dd78b0722e6510c79d8d5896c2986edd53323d3776d37c46a14a359f2292009218c5e9efb4aef3b4a71198da1298197d5c4509415d32f5a695b
-
SSDEEP
1536:muyCNTAGL2JXJd6KmbU42bSaNTAnrq4dY90+Yp:muyeTAGL2JXJQKmI42bSFnrq4n+Yp
Behavioral task
behavioral1
Sample
updater.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
0.5.8
Niggers
bSO9sTEW154P
-
delay
5
-
install
true
-
install_file
updater.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/Hbm5qNCB
Targets
-
-
Target
updater.exe
-
Size
58KB
-
MD5
ee5b9ebce290a31f433d2f0a7c0a68c7
-
SHA1
bf43d58541c0414d688c32a3e5ad6e26adb61139
-
SHA256
caf642fb3b0b025f018be00082dfc2c068a57c75fb0f1efa63e04b9ab0f4e654
-
SHA512
36aa1ca70e064dd78b0722e6510c79d8d5896c2986edd53323d3776d37c46a14a359f2292009218c5e9efb4aef3b4a71198da1298197d5c4509415d32f5a695b
-
SSDEEP
1536:muyCNTAGL2JXJd6KmbU42bSaNTAnrq4dY90+Yp:muyeTAGL2JXJQKmI42bSFnrq4n+Yp
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-