General
-
Target
2024-08-06_8ca8d1fe960a2b10d28ba017a8e71e10_hiddentear
-
Size
592KB
-
Sample
240806-a5rstaxfpe
-
MD5
8ca8d1fe960a2b10d28ba017a8e71e10
-
SHA1
2157e3dff5041988706756723655d5501ae8148f
-
SHA256
566faf9961e590ce146c85c70fc08191682a20166d852ace3a269c418135cfb4
-
SHA512
475ce76b2ed0ca3d2284fb9e3cc4ae4aad0b7e9eba21bf615dd1f23bf6d3d150e472dee430884d2243e6b02509c46b2c5c796122aba076f828015c050df6eccd
-
SSDEEP
12288:qpFbY22u8RFARyGfQ3MWTZfV/hlBg1ddAAZkR:qpxY2CkyGob9/lkAp
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-06_8ca8d1fe960a2b10d28ba017a8e71e10_hiddentear.exe
Resource
win7-20240704-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.252.165.55:1987
AsyncMutex_6SI2OkPnk
-
delay
3
-
install
true
-
install_file
NOTES.exe
-
install_folder
%AppData%
Targets
-
-
Target
2024-08-06_8ca8d1fe960a2b10d28ba017a8e71e10_hiddentear
-
Size
592KB
-
MD5
8ca8d1fe960a2b10d28ba017a8e71e10
-
SHA1
2157e3dff5041988706756723655d5501ae8148f
-
SHA256
566faf9961e590ce146c85c70fc08191682a20166d852ace3a269c418135cfb4
-
SHA512
475ce76b2ed0ca3d2284fb9e3cc4ae4aad0b7e9eba21bf615dd1f23bf6d3d150e472dee430884d2243e6b02509c46b2c5c796122aba076f828015c050df6eccd
-
SSDEEP
12288:qpFbY22u8RFARyGfQ3MWTZfV/hlBg1ddAAZkR:qpxY2CkyGob9/lkAp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-