General
-
Target
2.exe
-
Size
63KB
-
Sample
241207-p8nynasqhx
-
MD5
e9ff73f7ac9cdfda1750c9bd02690da0
-
SHA1
9ec93301947378e702d1d56d529dbe3a8e4292ef
-
SHA256
3f21e6ce696e5f916325689de5abbe3bf6dad708e2da3b8f922c6c38d52ff62d
-
SHA512
2133fa8b87893e40eccb9f1b7c733a400bc78e57e66ebbbc8f34a21428e8991ac1858dfe1056af03bd72998a7f4fd24974c5e76990b77ca9a05ea643f784d6e8
-
SSDEEP
1536:fJxFz3FI8Cwof4wJK7bkyyiNhGbbiwY1I35AGBZVclN:fJxFz3FI8Cwo7JK7bky/vGbbioXzY
Malware Config
Extracted
asyncrat
1.0.7
Default
fojeweb571-45302.portmap.host:45302
fojeweb571-45302.portmap.host:4782
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
windows defender firewall.exe
-
install_folder
%AppData%
Targets
-
-
Target
2.exe
-
Size
63KB
-
MD5
e9ff73f7ac9cdfda1750c9bd02690da0
-
SHA1
9ec93301947378e702d1d56d529dbe3a8e4292ef
-
SHA256
3f21e6ce696e5f916325689de5abbe3bf6dad708e2da3b8f922c6c38d52ff62d
-
SHA512
2133fa8b87893e40eccb9f1b7c733a400bc78e57e66ebbbc8f34a21428e8991ac1858dfe1056af03bd72998a7f4fd24974c5e76990b77ca9a05ea643f784d6e8
-
SSDEEP
1536:fJxFz3FI8Cwof4wJK7bkyyiNhGbbiwY1I35AGBZVclN:fJxFz3FI8Cwo7JK7bky/vGbbioXzY
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-