General
-
Target
leclient.exe
-
Size
63KB
-
Sample
241116-mm2xaavdqe
-
MD5
516f81d3d2bd81638c90c4bedec6601a
-
SHA1
3722275b4a7cf17133c11d01d57889b860adfa39
-
SHA256
178bf6d0bc3dc22ee2887cb5535bbd74d107780bcd77f6e6d0139dd46e593164
-
SHA512
adc0d412e0a122ee66b61ccaebed5150c797d58b0ec1b5e7ea137878f27ad70c03c2039ffd285339c3143730927d3dea38463554ecf908644259419d7319c649
-
SSDEEP
1536:e5a9jPpYciRUTjJvywE68dPkSTUrsG5eMyevGbbkwqDPRuGbUVclN:e5a9jPpYciRUTjJv868dc9rsTMHvGbbe
Behavioral task
behavioral1
Sample
leclient.exe
Resource
win11-20241007-fr
Malware Config
Extracted
asyncrat
1.0.7
Default
90.49.19.120:4782
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_file
salenegro.exe
-
install_folder
%AppData%
Targets
-
-
Target
leclient.exe
-
Size
63KB
-
MD5
516f81d3d2bd81638c90c4bedec6601a
-
SHA1
3722275b4a7cf17133c11d01d57889b860adfa39
-
SHA256
178bf6d0bc3dc22ee2887cb5535bbd74d107780bcd77f6e6d0139dd46e593164
-
SHA512
adc0d412e0a122ee66b61ccaebed5150c797d58b0ec1b5e7ea137878f27ad70c03c2039ffd285339c3143730927d3dea38463554ecf908644259419d7319c649
-
SSDEEP
1536:e5a9jPpYciRUTjJvywE68dPkSTUrsG5eMyevGbbkwqDPRuGbUVclN:e5a9jPpYciRUTjJv868dc9rsTMHvGbbe
-
Asyncrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Possible privilege escalation attempt
-
Drops startup file
-
Modifies file permissions
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Accessibility Features
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Accessibility Features
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
2Disable or Modify Tools
2Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1