General
-
Target
30072024_0827_29072024_JuneOrder.exe.bz2
-
Size
182KB
-
Sample
240730-kcw7yazemd
-
MD5
0eba954ee1a3cf578c7fe3a5b3c5c40a
-
SHA1
933ad0514e90a75bdb3af99f66f2d047794f176a
-
SHA256
d1fba2d16b292e393bae1e2a292741a076b06c89e7254ecba7ab087d8bb496fb
-
SHA512
d293cd34a30938f4fbd8daaa6e0c77e58f7368d1d736c97cf0adabba6d3920368691f118f93938cb7429660ee10a88b0b78a33f8bc6b7f524d2e3c472c02d166
-
SSDEEP
3072:AIEZa6VxwU4aNwMy57LNP5gKoNp0YiZ6tWbjddW6fbG290FY1PwfjlKrt2TGn5IK:AXL/wU4aNwv57LB5BZ3bjnw290EPJkTi
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20240708-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
192.228.105.2:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchst.exe
-
install_folder
%AppData%
Targets
-
-
Target
sample
-
Size
510KB
-
MD5
2b19d65705eee546214513fb65948b2a
-
SHA1
20b6c01b9f20047fc9f3bf9baa14b5046cbc0012
-
SHA256
106dc2ab6da5448b983e66c7c6850533006abf9176eb6ee3d58e101b83d8d47f
-
SHA512
183bb9331b20d2f4118820bd372e5202220e29cfea2d5ae5fedd8d1a9bfaf548a9399aa604950553948899a1d75658e64480c660ce7f83bb89cd566e1385eb72
-
SSDEEP
6144:+ldk1cWQRNTB2/Me7eC9g1HGnKBvYfew0PjZmwvhhlJdZBuUwXtgZcJeJ:+cv0NTg/XrRnKBwfOM0dayZKeJ
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1