General
-
Target
Infected.exe
-
Size
63KB
-
Sample
241111-cgrt1szekp
-
MD5
9946d546b012e2ae18dd4e7614ce200a
-
SHA1
c6447183bdb1db024d5c263745ab07b99399bc73
-
SHA256
93f9787fddb2cf2d02f5e28432e9235ad726114c6821d50b6b29affd7ccf1440
-
SHA512
fdba49f0879b613a19352130fc0d2725b84ffd5ef9dcb111e5cf46ada4e05478099c8796b12a315a1209f4a58873e454e543dd68a06a5846218717faf098ef1b
-
SSDEEP
768:/LQXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oX25QqSuodpqKX:k/RKy7QxdSJYUbdh9sQduodpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
RATTERS
costs-river.gl.at.ply.gg:50440
-
delay
4
-
install
true
-
install_file
Microsoft Antimalware Service.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
9946d546b012e2ae18dd4e7614ce200a
-
SHA1
c6447183bdb1db024d5c263745ab07b99399bc73
-
SHA256
93f9787fddb2cf2d02f5e28432e9235ad726114c6821d50b6b29affd7ccf1440
-
SHA512
fdba49f0879b613a19352130fc0d2725b84ffd5ef9dcb111e5cf46ada4e05478099c8796b12a315a1209f4a58873e454e543dd68a06a5846218717faf098ef1b
-
SSDEEP
768:/LQXPRKF4j7C78BIC8A+X+mazcBRL5JTk1+T4KSBGHmDbD/ph0oX25QqSuodpqKX:k/RKy7QxdSJYUbdh9sQduodpqKmY7
-
Asyncrat family
-
Stealerium family
-
StormKitty payload
-
Stormkitty family
-
Async RAT payload
-
Renames multiple (1275) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-