General
-
Target
Infected.exe
-
Size
63KB
-
Sample
241020-1vtgrssdng
-
MD5
e986330d6cfb70291985b064bcef56be
-
SHA1
1daa9abaf721a997df355d091faadea3642bb671
-
SHA256
efc1995469709c3c47b68816853480833240b5d455b975cd5dc1e13545ab3ea2
-
SHA512
889556c410f3d8cdc9412e777d36f1feecc857fcfac4a5d7fee9eda2de3507e7cfeb4393d7e1ff70bb040b74b8eeb11fb07ffafd915ce0e6a711b986c98272a1
-
SSDEEP
768:/LqvXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oXfyq+SuodpqM:U/RKy7QxdSJYUbdh9qqJuodpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
options-printing.gl.at.ply.gg:29154
-
delay
1
-
install
true
-
install_file
ppasshole.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
e986330d6cfb70291985b064bcef56be
-
SHA1
1daa9abaf721a997df355d091faadea3642bb671
-
SHA256
efc1995469709c3c47b68816853480833240b5d455b975cd5dc1e13545ab3ea2
-
SHA512
889556c410f3d8cdc9412e777d36f1feecc857fcfac4a5d7fee9eda2de3507e7cfeb4393d7e1ff70bb040b74b8eeb11fb07ffafd915ce0e6a711b986c98272a1
-
SSDEEP
768:/LqvXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oXfyq+SuodpqM:U/RKy7QxdSJYUbdh9qqJuodpqKmY7
Score10/10-
Async RAT payload
-
Renames multiple (1279) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-