General
-
Target
AsyncClient (1).exe
-
Size
47KB
-
Sample
241125-dq1zqa1nek
-
MD5
f65631d6798eaa350884e4f996f7f6a9
-
SHA1
a913ae3757728dc296bc1076147eb840e887d8fc
-
SHA256
e0f9ca55f06233cd4e2a7e4cf77fb678a9cff34b548c85ea7c2cdf7ede07270c
-
SHA512
e0c73a639c5236a9cb1800732c736c3a3071e50660495517e43b55b815eb99d0faf74f04e3de79e9fa112b6a09721d178f3b3929585fbfdb5bee2cda95b6bd0e
-
SSDEEP
768:xuyxNTAoZjRWUJd9bmo2qL5+Cr96UGMRPIom7e7PesJ0bFm3sJsynjSY1zeBDZMx:xuyxNTAGL2xuCMOom7ebRubFm3kZlMdO
Behavioral task
behavioral1
Sample
AsyncClient (1).exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
between-reprint.gl.at.ply.gg:5942
CKnrCmvLB4KG
-
delay
3
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Targets
-
-
Target
AsyncClient (1).exe
-
Size
47KB
-
MD5
f65631d6798eaa350884e4f996f7f6a9
-
SHA1
a913ae3757728dc296bc1076147eb840e887d8fc
-
SHA256
e0f9ca55f06233cd4e2a7e4cf77fb678a9cff34b548c85ea7c2cdf7ede07270c
-
SHA512
e0c73a639c5236a9cb1800732c736c3a3071e50660495517e43b55b815eb99d0faf74f04e3de79e9fa112b6a09721d178f3b3929585fbfdb5bee2cda95b6bd0e
-
SSDEEP
768:xuyxNTAoZjRWUJd9bmo2qL5+Cr96UGMRPIom7e7PesJ0bFm3sJsynjSY1zeBDZMx:xuyxNTAGL2xuCMOom7ebRubFm3kZlMdO
Score10/10-
Asyncrat family
-
Async RAT payload
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Scheduled Task/Job
1Scheduled Task
1