General
-
Target
3264d80b841271f4c5da008feb2b11ba2e5702ad8bed7751d8a53883f75d1738
-
Size
261KB
-
Sample
241205-zvrgqs1re1
-
MD5
9206cb7b2e14f4801a597894a156b8e5
-
SHA1
c0a84cb768f5848b83fafd0f3b7313a60d0cec9a
-
SHA256
3264d80b841271f4c5da008feb2b11ba2e5702ad8bed7751d8a53883f75d1738
-
SHA512
1aabb8ef8b18d49baf39f0fe65b941f7ac02dc6fb2bd4cddc86e1bb889cf745fd7de980bfe96365ccdc0a168fb4424c6edbd724b50f265303dd812a44b1b830a
-
SSDEEP
6144:vuEat9Zl5bubNNUXeEdQ2BHyaUFRwFCX0hVt:v8lOafLRmFaCmt
Behavioral task
behavioral1
Sample
3264d80b841271f4c5da008feb2b11ba2e5702ad8bed7751d8a53883f75d1738.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
chela.ddns.net:1177
CF6aV8bVJb6I
-
delay
3
-
install
true
-
install_file
AyoubHDJ04.exe
-
install_folder
%AppData%
Targets
-
-
Target
3264d80b841271f4c5da008feb2b11ba2e5702ad8bed7751d8a53883f75d1738
-
Size
261KB
-
MD5
9206cb7b2e14f4801a597894a156b8e5
-
SHA1
c0a84cb768f5848b83fafd0f3b7313a60d0cec9a
-
SHA256
3264d80b841271f4c5da008feb2b11ba2e5702ad8bed7751d8a53883f75d1738
-
SHA512
1aabb8ef8b18d49baf39f0fe65b941f7ac02dc6fb2bd4cddc86e1bb889cf745fd7de980bfe96365ccdc0a168fb4424c6edbd724b50f265303dd812a44b1b830a
-
SSDEEP
6144:vuEat9Zl5bubNNUXeEdQ2BHyaUFRwFCX0hVt:v8lOafLRmFaCmt
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-