General
-
Target
Zkfi
-
Size
20KB
-
Sample
241011-ad176stgnf
-
MD5
a96903d3ed4d88d61069e17916482963
-
SHA1
4be7c346c472640a01e94a118fc8d8c5e3357d21
-
SHA256
900b26aa692bc4c3633f2dab0e661c896c2b00868ce2eb6c95fe7ee8665527d9
-
SHA512
77b082448733da9685ad93fc7973d41ee79674c43bebfbedd8e5ac6263c6ab071b0a5f6ee48634b03bfd32f39dd80b5c940123fafe67add79779c9004b1ed0a9
-
SSDEEP
192:nQ7hEoDgxUpeWw9y89uQABYOfNwsC8xZXIQhVaEa2i8ca1Wb/:nQeuyAHFtBdaEaU1Wr
Static task
static1
Behavioral task
behavioral1
Sample
Zkfi.html
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
production-loading.gl.at.ply.gg:48573
-
delay
1
-
install
true
-
install_file
svcohost.exe
-
install_folder
%AppData%
Targets
-
-
Target
Zkfi
-
Size
20KB
-
MD5
a96903d3ed4d88d61069e17916482963
-
SHA1
4be7c346c472640a01e94a118fc8d8c5e3357d21
-
SHA256
900b26aa692bc4c3633f2dab0e661c896c2b00868ce2eb6c95fe7ee8665527d9
-
SHA512
77b082448733da9685ad93fc7973d41ee79674c43bebfbedd8e5ac6263c6ab071b0a5f6ee48634b03bfd32f39dd80b5c940123fafe67add79779c9004b1ed0a9
-
SSDEEP
192:nQ7hEoDgxUpeWw9y89uQABYOfNwsC8xZXIQhVaEa2i8ca1Wb/:nQeuyAHFtBdaEaU1Wr
-
Async RAT payload
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1