General
-
Target
now.exe
-
Size
63KB
-
Sample
241207-cwpcfa1kc1
-
MD5
742a8c6a17671e7db3e4fa1c15534fb1
-
SHA1
5f6e4b10c34e512cd1110b6c67b0722d00d5a34d
-
SHA256
6a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
-
SHA512
315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442
-
SSDEEP
1536:DZmttUdjLAQBae5Q5uEPGbbQwTPVbGBi/J6GVZVclN:DZmttUdjvBF5Qw2GbbQ6dzY
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:64431
fojeweb571-64431.portmap.host:8848
fojeweb571-64431.portmap.host:64431
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Targets
-
-
Target
now.exe
-
Size
63KB
-
MD5
742a8c6a17671e7db3e4fa1c15534fb1
-
SHA1
5f6e4b10c34e512cd1110b6c67b0722d00d5a34d
-
SHA256
6a93f241b22b9784403998ec187fcf75ae9dd830aa834b7698052165ef225ec0
-
SHA512
315a99105682595fd8366c3e237e57a187a4902bcf49894a35aa3d5a0cde32d26168a530dc9d9b8d00d27debf2be6f6eadcd1b17ce86c53a1d80c5a711f3d442
-
SSDEEP
1536:DZmttUdjLAQBae5Q5uEPGbbQwTPVbGBi/J6GVZVclN:DZmttUdjvBF5Qw2GbbQ6dzY
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-