General
-
Target
c28b393fccf6d23f9b175b44c4288893.bin
-
Size
523KB
-
Sample
240910-b7m33ssfqe
-
MD5
9827e4d548261a4472eb77548a613b56
-
SHA1
f889b794ce984534cde40a0533cf8da70fc9f02e
-
SHA256
a77bf4f6f417a480f95547d6c6a332c42048d91e1768ff60afcc3ee54ff6e8c2
-
SHA512
c3a616e146944445dfa0e53fa03111dd1f2d43bf0be31c128a8ef941e32f5790c1fc690ffffd93c8c2ec83756641edd9595c304c137a0564b09897a58f3225ad
-
SSDEEP
12288:H088kJrTR3LwMrgFCT8Ga9lskVO7ii/ItCyQl5:HbFTSPU0xVNQyK5
Static task
static1
Behavioral task
behavioral1
Sample
08c456bc976fd183171bf7fef71d8fc37894a9e0e2c3b041b589cd864fce698a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08c456bc976fd183171bf7fef71d8fc37894a9e0e2c3b041b589cd864fce698a.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
http://pastebin.com/raw/V9y5Q5vv
Extracted
asyncrat
1.0.7
SUEPR ENVIO SEP03
nyan43.duckdns.org:1963
YHGBVFDC
-
delay
15
-
install
false
-
install_file
qawsedrftyujgh.exe
-
install_folder
%AppData%
Extracted
vjw0rm
http://yuya0415.duckdns.org:1928
Targets
-
-
Target
08c456bc976fd183171bf7fef71d8fc37894a9e0e2c3b041b589cd864fce698a.exe
-
Size
669KB
-
MD5
c28b393fccf6d23f9b175b44c4288893
-
SHA1
7d081db02f6654c785fca5b8187e13fdde5878c6
-
SHA256
08c456bc976fd183171bf7fef71d8fc37894a9e0e2c3b041b589cd864fce698a
-
SHA512
e9167c23388fe417a1da2733272a40052ca5db5f1068e57bfcf0864e129e7e9a5aab43d10647e6bdc2b84eb66f7ab0f1677e268f5581931b8a147cf74330fc3b
-
SSDEEP
12288:SBdlwHRn+WlYV+W2X+t4DwlFpJu0nTXoJwh7mA9St4xjXLYqEWXP+YjjPGoTI:SBkVdlYAW0MlFPnEJwB9SojIFkjPGR
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1