General
-
Target
SolaraB.exe
-
Size
129KB
-
Sample
240714-kcfj7awalc
-
MD5
4eed882d9e46f1270ed2121d00429189
-
SHA1
6adfbe0b4e8b83da1cb6d2a696cfa359c1d31176
-
SHA256
85156af07c7d1ac58dfa6d0e0c5d3866b4d57c73c88c466db204e15ffa72888a
-
SHA512
e8babe8e239c4da4e82f87d2677bef7b4032ffdddaae9dcd4694ef1f0902c053c6c7966ce1cf0c756334d2c936ee3a5600ce704de9aa0b414a33f55599f1e349
-
SSDEEP
3072:bMSncRzAOQKhp5LrUwk4XqdPbIGbb02NOgzY+mZgv:ASncRlvhbLrUwk4Xq1bIkbJNNU
Static task
static1
Malware Config
Extracted
asyncrat
1.0.7
Default
always-assessment.gl.at.ply.gg:13857
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
SolaraB.exe
-
Size
129KB
-
MD5
4eed882d9e46f1270ed2121d00429189
-
SHA1
6adfbe0b4e8b83da1cb6d2a696cfa359c1d31176
-
SHA256
85156af07c7d1ac58dfa6d0e0c5d3866b4d57c73c88c466db204e15ffa72888a
-
SHA512
e8babe8e239c4da4e82f87d2677bef7b4032ffdddaae9dcd4694ef1f0902c053c6c7966ce1cf0c756334d2c936ee3a5600ce704de9aa0b414a33f55599f1e349
-
SSDEEP
3072:bMSncRzAOQKhp5LrUwk4XqdPbIGbb02NOgzY+mZgv:ASncRlvhbLrUwk4Xq1bIkbJNNU
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-