General
-
Target
Client1.exe
-
Size
48KB
-
Sample
240802-l7x86azbnb
-
MD5
bfd2e3a5b4e15ccd7dfd6b4911e3c7e4
-
SHA1
1396456c85cab058901217b31001b165992b3347
-
SHA256
b2f20f38ab8db652c4bde2249f32f5916f8376f882059d3d07a5cccf232b40e0
-
SHA512
6295ffb23980842fda55714db45a8ae71aa52c0bc76d33f28d5db9d6948f5d52a1970732551645eaccb02dc977c8b0ebd327b0d69c995922185e0c4a6d019a0c
-
SSDEEP
768:kBJmQiGybcILcGIl+jiPY/ah+diRi++98Ybnge4rvEgK/JHZVc6KN:kBigFeqXx+9zbgdrnkJHZVclN
Behavioral task
behavioral1
Sample
Client1.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
apex.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/vtRDA9rk
Targets
-
-
Target
Client1.exe
-
Size
48KB
-
MD5
bfd2e3a5b4e15ccd7dfd6b4911e3c7e4
-
SHA1
1396456c85cab058901217b31001b165992b3347
-
SHA256
b2f20f38ab8db652c4bde2249f32f5916f8376f882059d3d07a5cccf232b40e0
-
SHA512
6295ffb23980842fda55714db45a8ae71aa52c0bc76d33f28d5db9d6948f5d52a1970732551645eaccb02dc977c8b0ebd327b0d69c995922185e0c4a6d019a0c
-
SSDEEP
768:kBJmQiGybcILcGIl+jiPY/ah+diRi++98Ybnge4rvEgK/JHZVc6KN:kBigFeqXx+9zbgdrnkJHZVclN
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-