General
-
Target
YAAKJF.exe
-
Size
45KB
-
Sample
241116-y565haxldp
-
MD5
3c9b4e3886756c28e710d2af41de6423
-
SHA1
a4c1402f70953e494b66cceda691fa7ac9430a02
-
SHA256
0c13398c86b3cbb07fd9b9eafde5849afff6b15f7905e77636d84dfa945d9485
-
SHA512
82f19d64dd69bbc7145565eee747339de6d348831f01062192d214e32896772bc6ebb893774f25e086cdcf2a75be7a36e6dde256f3748eff19f085ba6836aa06
-
SSDEEP
768:9u50dTtQpVBTWU/fShmo2qg59dRTMKPIuljbGgX3il4gq/Ztg2hBDZXx:9u50dTt0y2FB+utbZXSaRXdXx
Behavioral task
behavioral1
Sample
YAAKJF.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:4782
127.0.0.1:3425
Cristopher11sa-62565.portmap.host:6606
Cristopher11sa-62565.portmap.host:7707
Cristopher11sa-62565.portmap.host:8808
Cristopher11sa-62565.portmap.host:4782
Cristopher11sa-62565.portmap.host:3425
190.104.116.8:6606
190.104.116.8:7707
190.104.116.8:8808
190.104.116.8:4782
190.104.116.8:3425
azxq0ap.localto.net:6606
azxq0ap.localto.net:7707
azxq0ap.localto.net:8808
azxq0ap.localto.net:4782
azxq0ap.localto.net:3425
E2qgtjRHaRSi
-
delay
3
-
install
false
-
install_file
Java updater.exe
-
install_folder
%AppData%
Targets
-
-
Target
YAAKJF.exe
-
Size
45KB
-
MD5
3c9b4e3886756c28e710d2af41de6423
-
SHA1
a4c1402f70953e494b66cceda691fa7ac9430a02
-
SHA256
0c13398c86b3cbb07fd9b9eafde5849afff6b15f7905e77636d84dfa945d9485
-
SHA512
82f19d64dd69bbc7145565eee747339de6d348831f01062192d214e32896772bc6ebb893774f25e086cdcf2a75be7a36e6dde256f3748eff19f085ba6836aa06
-
SSDEEP
768:9u50dTtQpVBTWU/fShmo2qg59dRTMKPIuljbGgX3il4gq/Ztg2hBDZXx:9u50dTt0y2FB+utbZXSaRXdXx
Score10/10-
Asyncrat family
-
Sets desktop wallpaper using registry
-