General
-
Target
166d084ca362984e8c8759c77644963e.bin
-
Size
395KB
-
Sample
241116-bdkqvszpdl
-
MD5
6ba036ea87e0933aaa6f1ecec73a4eba
-
SHA1
26c3455ab2aff469a329770dce8a6f696d5b98aa
-
SHA256
b49c03197ae6f52862ae9bca96de93929422fe7929739d2429139b6ad108f84d
-
SHA512
dc0b26b5530d0ade08b3f6756f6f9599ad9d4f44249cd06647341e7ad05673fa877ab3d3c4ad31bcc0c8a53a458b0c14c4a749026306b6711f12db416df5dabb
-
SSDEEP
12288:+QGCh22zT9zdj65tjCFgszBpcu2KUosR3:+zCh22tBetj0gszBpcu2KU5
Static task
static1
Behavioral task
behavioral1
Sample
6fed9ac910b4570ce24f3d4230fbe550f181ad5f1ab089725e3eb9f7e8142f2e.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
0.5.8
Default
95.179.135.209:1989
FhYe09MKTBbQ
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
6fed9ac910b4570ce24f3d4230fbe550f181ad5f1ab089725e3eb9f7e8142f2e.exe
-
Size
1.6MB
-
MD5
166d084ca362984e8c8759c77644963e
-
SHA1
2a020dd02a2882c9a785ea5f81e435413f90bf36
-
SHA256
6fed9ac910b4570ce24f3d4230fbe550f181ad5f1ab089725e3eb9f7e8142f2e
-
SHA512
ddce968417460650561dcbfd9d61c413fc5bff892a4b0263aeed911f07954d57d1413af35a73d45edbdb4975e59eecbb782be20b5097c2e781295e95b08c770a
-
SSDEEP
12288:Pvql1LFyp0Qgxun0rYe6MrQKrKFPyvrvA7fP:gL8/gx16MrQKrgPyvbA7P
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4