Resubmissions
07-11-2024 21:54
241107-1smw7s1rhm 10General
-
Target
YjJqp0O3NZzC.reg
-
Size
89KB
-
Sample
241107-1smw7s1rhm
-
MD5
e0fc383452ae4ef76fbd8edaaea8208a
-
SHA1
4101569ca940535cea9ddc24eab79a4c6ed5d790
-
SHA256
cf6c2c3495096544c6957276ee7dfea94f4a6efbe9b94d36df73cd6bf14da39c
-
SHA512
33160b4f22a42c3461cc8b193598d8abf20a5dc93965894c17856a08127474440211e3bda12d74f7ff1139ecebd07ec67efc64f3d75a396ccd44e83e73ebf832
-
SSDEEP
1536:GlyQtvJw8Tq6YLgbJSoR0Qbu+l0V1iiYio5RTQlAwUWzI1YWsV2vRrYTxWy0:PolxhbM6buNfibjTUUWzB5Hth0
Static task
static1
Behavioral task
behavioral1
Sample
YjJqp0O3NZzC.reg
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
YjJqp0O3NZzC.reg
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
4.tcp.eu.ngrok.io:2024
4.tcp.eu.ngrok.io:13752
RkZ0iMw0b8YJ
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
YjJqp0O3NZzC.reg
-
Size
89KB
-
MD5
e0fc383452ae4ef76fbd8edaaea8208a
-
SHA1
4101569ca940535cea9ddc24eab79a4c6ed5d790
-
SHA256
cf6c2c3495096544c6957276ee7dfea94f4a6efbe9b94d36df73cd6bf14da39c
-
SHA512
33160b4f22a42c3461cc8b193598d8abf20a5dc93965894c17856a08127474440211e3bda12d74f7ff1139ecebd07ec67efc64f3d75a396ccd44e83e73ebf832
-
SSDEEP
1536:GlyQtvJw8Tq6YLgbJSoR0Qbu+l0V1iiYio5RTQlAwUWzI1YWsV2vRrYTxWy0:PolxhbM6buNfibjTUUWzB5Hth0
-
Asyncrat family
-
Async RAT payload
-
System Binary Proxy Execution: Regsvcs/Regasm
Abuse Regasm to proxy execution of malicious code.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-