General
-
Target
89d813e660f2438c15b502fe9cba3a61dd069a4f4fafded91feac3039731bdb4.exe
-
Size
513KB
-
Sample
241108-dvfjksvalq
-
MD5
8d8718cc95ecf6af196cc0c0eaac9ae2
-
SHA1
0c822251da19e4f9f5a0b555d85fcf8813034b32
-
SHA256
89d813e660f2438c15b502fe9cba3a61dd069a4f4fafded91feac3039731bdb4
-
SHA512
98a74f1db9a7334f05327d871e7aa4e3b264d2cc36709df6e625edb79dde1e49a355b439fa7b72e6a5714a9c2e5b8807aa94aa137fee36c78388bbeeb9445114
-
SSDEEP
12288:iE/ShrODzyPjurrSN/nGtZr0IMr3xYokt9mROPBMzt:d/2PAShG30X3um3B
Static task
static1
Behavioral task
behavioral1
Sample
89d813e660f2438c15b502fe9cba3a61dd069a4f4fafded91feac3039731bdb4.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | RxR
Default
lastofdr51.mywire.org:6606
lastofdr51.mywire.org:7707
lastofdr51.mywire.org:8808
Nightmare15.strangled.net:6606
Nightmare15.strangled.net:7707
Nightmare15.strangled.net:8808
darkenssnight.ydns.eu:6606
darkenssnight.ydns.eu:7707
darkenssnight.ydns.eu:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
SystemUpdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
89d813e660f2438c15b502fe9cba3a61dd069a4f4fafded91feac3039731bdb4.exe
-
Size
513KB
-
MD5
8d8718cc95ecf6af196cc0c0eaac9ae2
-
SHA1
0c822251da19e4f9f5a0b555d85fcf8813034b32
-
SHA256
89d813e660f2438c15b502fe9cba3a61dd069a4f4fafded91feac3039731bdb4
-
SHA512
98a74f1db9a7334f05327d871e7aa4e3b264d2cc36709df6e625edb79dde1e49a355b439fa7b72e6a5714a9c2e5b8807aa94aa137fee36c78388bbeeb9445114
-
SSDEEP
12288:iE/ShrODzyPjurrSN/nGtZr0IMr3xYokt9mROPBMzt:d/2PAShG30X3um3B
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-