General
-
Target
1E45D6ABB8FA749D0FDE3EADD586E637.exe
-
Size
258KB
-
Sample
241201-mtgjxstqbm
-
MD5
1e45d6abb8fa749d0fde3eadd586e637
-
SHA1
4a961b4a92fa3fb1265f729d18f2f0638cba018a
-
SHA256
d21a63a1bcc5afdc0eb4b00e6b82af4bdf1f634e50d0d51001a4c27ac7f84379
-
SHA512
58f30c478856230c16ae7bb8425e32e0dce23d927de1d7d4697400617609a3f5dfd9ceca98426b05e240ae515ba5408af569714c9d95e17652c0e83406762900
-
SSDEEP
3072:Xxjla5113NyCzPWYykCbXCfe8jtgszyAVibmbJ30U11xjZjsDQBxQh68:XZla513yAykOyG2gszyjm1EUTEDO
Static task
static1
Behavioral task
behavioral1
Sample
1E45D6ABB8FA749D0FDE3EADD586E637.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
2.56.179.212:4445
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
THK.exe
-
install_folder
%AppData%
Targets
-
-
Target
1E45D6ABB8FA749D0FDE3EADD586E637.exe
-
Size
258KB
-
MD5
1e45d6abb8fa749d0fde3eadd586e637
-
SHA1
4a961b4a92fa3fb1265f729d18f2f0638cba018a
-
SHA256
d21a63a1bcc5afdc0eb4b00e6b82af4bdf1f634e50d0d51001a4c27ac7f84379
-
SHA512
58f30c478856230c16ae7bb8425e32e0dce23d927de1d7d4697400617609a3f5dfd9ceca98426b05e240ae515ba5408af569714c9d95e17652c0e83406762900
-
SSDEEP
3072:Xxjla5113NyCzPWYykCbXCfe8jtgszyAVibmbJ30U11xjZjsDQBxQh68:XZla513yAykOyG2gszyjm1EUTEDO
-
Asyncrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-