General
-
Target
d2ef48c59444db481a238f32b6fb35abee02165fa1b0bf63080f9b89728d7cfa
-
Size
2KB
-
Sample
241111-s2nwvs1eje
-
MD5
5358d8d8fe485972eb8115f7daf16080
-
SHA1
245e93bc84a9e8635732a8b9a9ed2e906a09f1c0
-
SHA256
d2ef48c59444db481a238f32b6fb35abee02165fa1b0bf63080f9b89728d7cfa
-
SHA512
5808ab33e81962bc5252022357a2906651a84ad1cdcf007e5b21d0eb9ff1f08c9fde44d186a18c64e06e8c3ccb6b751de000e1877922dccb8cf7e6cc7996bf74
Static task
static1
Behavioral task
behavioral1
Sample
d2ef48c59444db481a238f32b6fb35abee02165fa1b0bf63080f9b89728d7cfa.lnk
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
Default
103.125.189.155:8848
DcRatMutex_adxzvxv
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
d2ef48c59444db481a238f32b6fb35abee02165fa1b0bf63080f9b89728d7cfa
-
Size
2KB
-
MD5
5358d8d8fe485972eb8115f7daf16080
-
SHA1
245e93bc84a9e8635732a8b9a9ed2e906a09f1c0
-
SHA256
d2ef48c59444db481a238f32b6fb35abee02165fa1b0bf63080f9b89728d7cfa
-
SHA512
5808ab33e81962bc5252022357a2906651a84ad1cdcf007e5b21d0eb9ff1f08c9fde44d186a18c64e06e8c3ccb6b751de000e1877922dccb8cf7e6cc7996bf74
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-