General
-
Target
Apsgmjd_Belphegor_obf.exe
-
Size
188KB
-
Sample
241207-hppyaa1mhz
-
MD5
a37ccab1ff586abb6e43113ab8a2b10d
-
SHA1
b9b97fc3bdcf3eb35ad68130a34ecaceef936bac
-
SHA256
46af4880547cfe5d6c873f86f7b172640ddffd445794dcbc213ebb399e38a226
-
SHA512
733115ebe0a453b6aef0e73677525c5f2e3aec1bb1327794db20d2403fdf62fac5ef4ba6d951d03904e877de6475032840eb0b4272a62e8a97d818cbbb2a8aeb
-
SSDEEP
3072:7BhYrfk5BR4ko5ZTFW9bwFaqiUrD7Lz6U+x+:ckl5QNFW9b2aqDnJ+
Behavioral task
behavioral1
Sample
Apsgmjd_Belphegor_obf.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Apsgmjd_Belphegor_obf.exe
-
Size
188KB
-
MD5
a37ccab1ff586abb6e43113ab8a2b10d
-
SHA1
b9b97fc3bdcf3eb35ad68130a34ecaceef936bac
-
SHA256
46af4880547cfe5d6c873f86f7b172640ddffd445794dcbc213ebb399e38a226
-
SHA512
733115ebe0a453b6aef0e73677525c5f2e3aec1bb1327794db20d2403fdf62fac5ef4ba6d951d03904e877de6475032840eb0b4272a62e8a97d818cbbb2a8aeb
-
SSDEEP
3072:7BhYrfk5BR4ko5ZTFW9bwFaqiUrD7Lz6U+x+:ckl5QNFW9b2aqDnJ+
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies security service
-
Async RAT payload
-
Modifies Windows Firewall
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies file permissions
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
File and Directory Permissions Modification
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
7