General
-
Target
Ujuax.iso
-
Size
4.8MB
-
Sample
240717-xgb4saxcrf
-
MD5
bd5b5a9b77145e3d360123469b34075e
-
SHA1
f9f971397a7523d79829553e839ddaae7e0bb869
-
SHA256
fbb41333d4ca06cace9a9d040cc9c2a95a644a03298da9789def5f48e34f5515
-
SHA512
5c525f9654cdf4c284b73e37dec8055dca3fb757c63969c966fa3118cb214c7947cddb4bf9b5c5416d43a16034bcbb8dd00d896f0510dcfda15ac16acaabe1b0
-
SSDEEP
24576:f0cxDzNN+hJELofuY4e9fB03aZTtjck/aCbycRZxE7EiMdwTBHPJArTJnC03Ud1E:Mcnk
Static task
static1
Behavioral task
behavioral1
Sample
Ujuax.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Ujuax.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Ujuax.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
Scar
scar77747.duckdns.org:6606
scar77747.duckdns.org:7707
scar77747.duckdns.org:8808
Alx_alx
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Ujuax.exe
-
Size
4.8MB
-
MD5
cc0586b98c46e5ed73efb1b0e9181130
-
SHA1
ff4a38d4acb50e4385727ef5455b77344b9b01c6
-
SHA256
b32f304e47735f05127ca24f7094514ef8b2b6d4d23c2b34a519ada6dc93b628
-
SHA512
2a8e5c1f6a449abe949b7e1fab291a1919bb80859648fd2bad50cf46964a3292db7f63663a4aa9f62993f3f85fb1e14fd05dfc68f9632e25f19a59bdf9e22468
-
SSDEEP
24576:D0cxDzNN+hJELofuY4e9fB03aZTtjck/aCbycRZxE7EiMdwTBHPJArTJnC03Ud1E:4cnk
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-