General
-
Target
KINGSAMMETEXTUREPACK 2.2 EDITION.zip
-
Size
208KB
-
Sample
241130-y9xrmaylan
-
MD5
6cc48cafe20a0536709f5c53d9c2a7f6
-
SHA1
68388ee3a854c98d4616c8a780707f95b1816eb6
-
SHA256
2e66192d151718fc4fdbc392650f601e8aaa0294855433d03fca9d58e22b8ce0
-
SHA512
7e26d52a0c5acd41694ee5d8a1833b5130e2e704a5431bb2c02ee00a7bd81b45b0d84d5dd15b921c590eeed143090f6abced7c87d83fc1327ecfedcb2b6f5141
-
SSDEEP
6144:G+tvKpz0/mtg6vYZQcTUqZfCd2sQrTqLUV/9WcM:Gf0+aZTUqZ423nkqPM
Static task
static1
Behavioral task
behavioral1
Sample
KINGSAMMETEXTUREPACK 2.2 EDITION.zip
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
t3dbEcXv0Sbl
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
KINGSAMMETEXTUREPACK 2.2 EDITION.zip
-
Size
208KB
-
MD5
6cc48cafe20a0536709f5c53d9c2a7f6
-
SHA1
68388ee3a854c98d4616c8a780707f95b1816eb6
-
SHA256
2e66192d151718fc4fdbc392650f601e8aaa0294855433d03fca9d58e22b8ce0
-
SHA512
7e26d52a0c5acd41694ee5d8a1833b5130e2e704a5431bb2c02ee00a7bd81b45b0d84d5dd15b921c590eeed143090f6abced7c87d83fc1327ecfedcb2b6f5141
-
SSDEEP
6144:G+tvKpz0/mtg6vYZQcTUqZfCd2sQrTqLUV/9WcM:Gf0+aZTUqZ423nkqPM
-
Asyncrat family
-
Async RAT payload
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-