General
-
Target
Dropper.exe
-
Size
12KB
-
Sample
240714-21fzaswfnk
-
MD5
3c7266e1f13c9dd74dba9b7546601d01
-
SHA1
71434fc2a94fd910820f6b8d7d9440a5c45b7ae0
-
SHA256
5ab63870b80c8c0b2fb482f1c9581682740feac9ae7a5c0d8fd9b31997865330
-
SHA512
3b71e65c0d815b6444c6f908af0015491147438977bcb795b318a07b3b78e1c4491cf21265b90c742fb5615a900256bb2e03cf2074993cec07f46dcd6ae111b2
-
SSDEEP
384:t/kXUT2i7q9bJnz6PbQ4+FBCf3tmfhhD84VCsk:n2n9bJMbIytkhhDJwsk
Static task
static1
Behavioral task
behavioral1
Sample
Dropper.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Dropper.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
Default
environmental-blank.gl.at.ply.gg:25944
-
delay
1
-
install
true
-
install_file
$77-aachost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Dropper.exe
-
Size
12KB
-
MD5
3c7266e1f13c9dd74dba9b7546601d01
-
SHA1
71434fc2a94fd910820f6b8d7d9440a5c45b7ae0
-
SHA256
5ab63870b80c8c0b2fb482f1c9581682740feac9ae7a5c0d8fd9b31997865330
-
SHA512
3b71e65c0d815b6444c6f908af0015491147438977bcb795b318a07b3b78e1c4491cf21265b90c742fb5615a900256bb2e03cf2074993cec07f46dcd6ae111b2
-
SSDEEP
384:t/kXUT2i7q9bJnz6PbQ4+FBCf3tmfhhD84VCsk:n2n9bJMbIytkhhDJwsk
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-