General
-
Target
loader.bat
-
Size
540B
-
Sample
241127-v9jcfszkhp
-
MD5
a589333e5f49d10e2f2cad3f7315db41
-
SHA1
37c5bea8569e3bfd0caece0b8d88d817eab73e16
-
SHA256
65b18e0843829b1d85ce47307aba784ee659a2e2a164c584155211d764bb4ec3
-
SHA512
6b73eccb11430d34b4e74074a050985ee3211751b8e7bd50d94afc55b4b7e54f33f85f98e5f460278675368984169c02d7feb9eccc9284844901147ddb75544a
Static task
static1
Behavioral task
behavioral1
Sample
loader.bat
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Default
one-accordance.gl.at.ply.gg:9590
-
delay
1
-
install
true
-
install_file
Windows Defender.exe
-
install_folder
%AppData%
Extracted
asyncrat
0.5.8
Default
66.66.146.74:9511
nwJFeGdDXcL2
-
delay
3
-
install
true
-
install_file
System32.exe
-
install_folder
%AppData%
Targets
-
-
Target
loader.bat
-
Size
540B
-
MD5
a589333e5f49d10e2f2cad3f7315db41
-
SHA1
37c5bea8569e3bfd0caece0b8d88d817eab73e16
-
SHA256
65b18e0843829b1d85ce47307aba784ee659a2e2a164c584155211d764bb4ec3
-
SHA512
6b73eccb11430d34b4e74074a050985ee3211751b8e7bd50d94afc55b4b7e54f33f85f98e5f460278675368984169c02d7feb9eccc9284844901147ddb75544a
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-