General
-
Target
roaricle.exe
-
Size
63KB
-
Sample
241207-dhgwwaykdp
-
MD5
9f39043be09533636bbfdd4ec3101f6a
-
SHA1
1e964ba2a874c24a5fdc430c827a1ba82dc657ab
-
SHA256
179027517e90f9e8173f63ba247d7c0d414259fdef3a29a5692c85d84dce557d
-
SHA512
09c0573e2f4db331714d86d32abf9623b5a9560c1e7ac8359a0ef434cc79940143e837a2674aa5140b79e1b1302faf75df9959d184109aad231db78a90139233
-
SSDEEP
1536:PJxFz3FI8Cwof4wJ6Vfh2MBPG2bPw0mQCfhGxZVclN:PJxFz3FI8Cwo7J6VJL1G2bPTCfwzY
Behavioral task
behavioral1
Sample
roaricle.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
Default
fojeweb571-45302.portmap.host:4782
fojeweb571-45302.portmap.host:45302
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Targets
-
-
Target
roaricle.exe
-
Size
63KB
-
MD5
9f39043be09533636bbfdd4ec3101f6a
-
SHA1
1e964ba2a874c24a5fdc430c827a1ba82dc657ab
-
SHA256
179027517e90f9e8173f63ba247d7c0d414259fdef3a29a5692c85d84dce557d
-
SHA512
09c0573e2f4db331714d86d32abf9623b5a9560c1e7ac8359a0ef434cc79940143e837a2674aa5140b79e1b1302faf75df9959d184109aad231db78a90139233
-
SSDEEP
1536:PJxFz3FI8Cwof4wJ6Vfh2MBPG2bPw0mQCfhGxZVclN:PJxFz3FI8Cwo7J6VJL1G2bPTCfwzY
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-