General
-
Target
file.exe
-
Size
67.2MB
-
Sample
241109-rgprzswcnq
-
MD5
2a67434fe41c54946d0f82294efe0c46
-
SHA1
0109f1f1988289b9d9ff33f6bd9de5fb5d9e3a17
-
SHA256
4c8a37bba1eda81eb0e51922a98fa61f278fcab7b58870fa650865a53e308b1d
-
SHA512
f6a171693e63e326f9f5e7781fa8b6d783cf3da17c68d5381506d489c86469384d78ee183fecffeaf0bbc1ee1a11088c5cc5b6ba1cb0215994ace1c9ed43ccc0
-
SSDEEP
1572864:8X+49uMjQOzasFtnCfcc4ZKrTruLo5CXecJ2sMA:8qKQQJF+uQTr6BPJ2/A
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
139.99.3.47:6669
DynamoaaBDdajsdh1231bSDaJ21q3
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
file.exe
-
Size
67.2MB
-
MD5
2a67434fe41c54946d0f82294efe0c46
-
SHA1
0109f1f1988289b9d9ff33f6bd9de5fb5d9e3a17
-
SHA256
4c8a37bba1eda81eb0e51922a98fa61f278fcab7b58870fa650865a53e308b1d
-
SHA512
f6a171693e63e326f9f5e7781fa8b6d783cf3da17c68d5381506d489c86469384d78ee183fecffeaf0bbc1ee1a11088c5cc5b6ba1cb0215994ace1c9ed43ccc0
-
SSDEEP
1572864:8X+49uMjQOzasFtnCfcc4ZKrTruLo5CXecJ2sMA:8qKQQJF+uQTr6BPJ2/A
-
Asyncrat family
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1