General
-
Target
Infected.exe
-
Size
63KB
-
Sample
241201-ytmayszqd1
-
MD5
45db61adfe86228dd20597126a684af8
-
SHA1
3aa8f5b1c78b1361f7bd5dfa5b7dd24139318451
-
SHA256
53ff78b28192c5bcff9d2ebb969478dde46da1ffc70216a62dcb213d20244b01
-
SHA512
87575618fcb0324fdc671c19a6046802b92276944f18f1ddc56dea20ae86ca33ed0aa52f559a711313ecdc80885da2fd980ead9fe0397e434b5701c66e5490cf
-
SSDEEP
768:ijSu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXiYlDgh/5Sugdph:UrzV4dSJYUbdh9AIugdpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Default
comment-seasons.gl.at.ply.gg:13056
-
delay
1
-
install
true
-
install_file
susamogus.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
45db61adfe86228dd20597126a684af8
-
SHA1
3aa8f5b1c78b1361f7bd5dfa5b7dd24139318451
-
SHA256
53ff78b28192c5bcff9d2ebb969478dde46da1ffc70216a62dcb213d20244b01
-
SHA512
87575618fcb0324fdc671c19a6046802b92276944f18f1ddc56dea20ae86ca33ed0aa52f559a711313ecdc80885da2fd980ead9fe0397e434b5701c66e5490cf
-
SSDEEP
768:ijSu/n3jzh78J4C8A+XTSazcBRL5JTk1+T4KSBGHmDbD/ph0oXiYlDgh/5Sugdph:UrzV4dSJYUbdh9AIugdpqKmY7
Score10/10-
Asyncrat family
-
Async RAT payload
-
Renames multiple (1280) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-