General
-
Target
lkklnsgtnsdfgdfgsdfg.exe
-
Size
47KB
-
Sample
241209-1h3vnsxlgp
-
MD5
f6dac35d571337de0dcbfd8488519383
-
SHA1
f7807ad2b9c086889e492a3ff8e9a47df0d9ee19
-
SHA256
fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0
-
SHA512
5f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1
-
SSDEEP
768:DuQKNTREhzxrWUXrm5mo2q7ZwuoFI0rxfvR6fPIy840bMUCLDCUtdv8ewBkd6WRz:DuQKNTR+W2ZuojxfvR3y8zbpZU38eO0Z
Behavioral task
behavioral1
Sample
lkklnsgtnsdfgdfgsdfg.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:61882
rahyufgsaf-61882.portmap.host:6606
rahyufgsaf-61882.portmap.host:7707
rahyufgsaf-61882.portmap.host:8808
rahyufgsaf-61882.portmap.host:61882
jQF9EeB2cbGS
-
delay
3
-
install
true
-
install_file
roar.exe
-
install_folder
%AppData%
Targets
-
-
Target
lkklnsgtnsdfgdfgsdfg.exe
-
Size
47KB
-
MD5
f6dac35d571337de0dcbfd8488519383
-
SHA1
f7807ad2b9c086889e492a3ff8e9a47df0d9ee19
-
SHA256
fbd85258618d241a24904b372d95d4db16fa344e555ebdea2fe59e4c506194c0
-
SHA512
5f26dec175882f1740e405fa7129043a705d47de295547d4ce0a6047255b77994e398f26aa552b0ae119785749ae02f6339eadc97b5fc9c3e28cb3a1b60971c1
-
SSDEEP
768:DuQKNTREhzxrWUXrm5mo2q7ZwuoFI0rxfvR6fPIy840bMUCLDCUtdv8ewBkd6WRz:DuQKNTR+W2ZuojxfvR3y8zbpZU38eO0Z
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-