General
-
Target
Ui Updater.exe
-
Size
85KB
-
Sample
241123-1w2jrsvnbm
-
MD5
063025975333195143418fae4fc78cf5
-
SHA1
0286aa10e6705fe0752f2dd52ab9b6d9ba8610a1
-
SHA256
a7731137a8d24944b7e002922c499883098d1cdfcecf2a6202064beb906bc21d
-
SHA512
6f25ec5c470446b1f76b7478dff364b78f0393e72db8530c67dc874a6a3e9f49e3468ad5a25a6183e57c0d111b7502fc03d501bd470c43b46b79081c0b9ba3c5
-
SSDEEP
1536:RQSEyt49G4p/dwVrZEX8gSK3eQfGG8f5EXUkrdRbeaPgFg4dRDKejcbJe2PPsXC:RQ19ZIZW3nfGG8fCzrbxgFPKeIbBPsS
Static task
static1
Malware Config
Extracted
asyncrat
Default
more-entered.gl.at.ply.gg:2000
-
delay
1
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Targets
-
-
Target
Ui Updater.exe
-
Size
85KB
-
MD5
063025975333195143418fae4fc78cf5
-
SHA1
0286aa10e6705fe0752f2dd52ab9b6d9ba8610a1
-
SHA256
a7731137a8d24944b7e002922c499883098d1cdfcecf2a6202064beb906bc21d
-
SHA512
6f25ec5c470446b1f76b7478dff364b78f0393e72db8530c67dc874a6a3e9f49e3468ad5a25a6183e57c0d111b7502fc03d501bd470c43b46b79081c0b9ba3c5
-
SSDEEP
1536:RQSEyt49G4p/dwVrZEX8gSK3eQfGG8f5EXUkrdRbeaPgFg4dRDKejcbJe2PPsXC:RQ19ZIZW3nfGG8fCzrbxgFPKeIbBPsS
-
Asyncrat family
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-