General
-
Target
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1.exe
-
Size
63KB
-
Sample
241018-b423tssbkr
-
MD5
9eb074e0713a33f7a6e499b0fbf2484c
-
SHA1
132ca59a5fb654c3d0794f92f05eaf43e3a7af94
-
SHA256
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1
-
SHA512
367fbbf6f058ef21367e329c8b0373d482c9c97dfbb42a67b17c9b1dc1d0139ae879c8ddb87b0960c5545746610d2c5690343abb458818c2dea9dbca66f39794
-
SSDEEP
1536:JKh54k58k/GWZOKuvUYFgF4yY5biArLdcKgtiCrITGFx:JK/4k58kAKuvUYFgF4yY5bikcltiCOGx
Behavioral task
behavioral1
Sample
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
SolaraFake
anyone-blogging.gl.at.ply.gg:22284
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%Temp%
Targets
-
-
Target
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1.exe
-
Size
63KB
-
MD5
9eb074e0713a33f7a6e499b0fbf2484c
-
SHA1
132ca59a5fb654c3d0794f92f05eaf43e3a7af94
-
SHA256
519f3ceedba4471f3d5178451c1007911145fb6eaf4e259a2c29b8e3483dabb1
-
SHA512
367fbbf6f058ef21367e329c8b0373d482c9c97dfbb42a67b17c9b1dc1d0139ae879c8ddb87b0960c5545746610d2c5690343abb458818c2dea9dbca66f39794
-
SSDEEP
1536:JKh54k58k/GWZOKuvUYFgF4yY5biArLdcKgtiCrITGFx:JK/4k58kAKuvUYFgF4yY5bikcltiCOGx
Score10/10-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-