General
-
Target
Client.exe
-
Size
48KB
-
Sample
241110-f84vfa1ank
-
MD5
3b4c1a3663d6d5ae561b793822b045ab
-
SHA1
2ef8222de19762ab8558922b3ba3cfe53285b7ae
-
SHA256
56ab78b1f5f73c93d063d4c85837353b96c19bdacecb1d4ed955d170d2553980
-
SHA512
034bdc45bed22d7ad968ce7b6747ba2dfb80d350a82f77d291e01bb0076fb69e7fa79ff4f4b8160ae6779d466123fe50278c7c8ee3d04ce0c3ff9b2202e27b16
-
SSDEEP
768:1UcRUbDILQe08+bixtelDSN+iV08YbygextUBl/of1vEgK/JbWfVc6KN:mc8ExtKDs4zb10yBJK1nkJbWfVclN
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
opus hook injector.exe
-
install_folder
%AppData%
Targets
-
-
Target
Client.exe
-
Size
48KB
-
MD5
3b4c1a3663d6d5ae561b793822b045ab
-
SHA1
2ef8222de19762ab8558922b3ba3cfe53285b7ae
-
SHA256
56ab78b1f5f73c93d063d4c85837353b96c19bdacecb1d4ed955d170d2553980
-
SHA512
034bdc45bed22d7ad968ce7b6747ba2dfb80d350a82f77d291e01bb0076fb69e7fa79ff4f4b8160ae6779d466123fe50278c7c8ee3d04ce0c3ff9b2202e27b16
-
SSDEEP
768:1UcRUbDILQe08+bixtelDSN+iV08YbygextUBl/of1vEgK/JbWfVc6KN:mc8ExtKDs4zb10yBJK1nkJbWfVclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-