General
-
Target
18208ba6920a74e8ca7bd244571ae383.bin
-
Size
6KB
-
Sample
241109-bgv11atfpq
-
MD5
72a5dd7dd7297d595cea6a21498a5585
-
SHA1
1e18c1dc8d6e925485d6f07be3b39b8964a771f8
-
SHA256
b3e938ea7471932a05eb27214a4050fe96c80a371201aec89759e7ff7900491a
-
SHA512
875b8c90b1e4e44a890fbede3c487b2a07058ad6c73326b67704959f98cae61df3a2fc35d71467bb067529b0ff46da163e1cad36b89d07a4c33849cce7d4233d
-
SSDEEP
96:zGW2Ns/ORLAW12tZFePcSGATHnSMd+pnXFsZCKaptYZMim+G7ZLlYEDERrGJ:h+lRZeZkbXTHx8n1M2OK+G7DhME
Static task
static1
Behavioral task
behavioral1
Sample
1c30611e8e3a99301ffe1102d4f70c44fd2d7593878dcdf4178002777fe6e920.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
AWS | RxR
Default
lastofdr51.mywire.org:6606
lastofdr51.mywire.org:7707
lastofdr51.mywire.org:8808
Nightmare15.strangled.net:6606
Nightmare15.strangled.net:7707
Nightmare15.strangled.net:8808
darkenssnight.ydns.eu:6606
darkenssnight.ydns.eu:7707
darkenssnight.ydns.eu:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
SystemUpdate.exe
-
install_folder
%AppData%
Targets
-
-
Target
1c30611e8e3a99301ffe1102d4f70c44fd2d7593878dcdf4178002777fe6e920.exe
-
Size
12KB
-
MD5
18208ba6920a74e8ca7bd244571ae383
-
SHA1
61797d94d14935a588a799e8dc943355eb6f4022
-
SHA256
1c30611e8e3a99301ffe1102d4f70c44fd2d7593878dcdf4178002777fe6e920
-
SHA512
87fdb3de8301e8f2dd7b8601ee468e64387ce72616af21153d129f236bf28a6dd81e1ba905cd534281bdc94aca1d85898ec6e64170cab2bb58d3c608002f64f3
-
SSDEEP
192:4Qt7If16ODCvuuYT6DI6kDmBwqVT9N62uEiGe5PF:A16O5CDIJDawqrklEiP5P
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1