General
-
Target
5795_output.zip
-
Size
33KB
-
Sample
241209-vr15jszmal
-
MD5
8d598e1e0fa7d043dfe708106eb8ecee
-
SHA1
3a08132e93c877a4ac72b065a32b765b131ccf2f
-
SHA256
18953637935c5dd79eeb9783f6d96fef1746fdd9cb5d3b449ef8f9a16af8758f
-
SHA512
b6b9da55f9a8cebc242436043875ee069e438590bfcd3849cb9f42bc99695c33fb7435a6908383f3040d24590ca0c35cd40ff816ad0501f50feea975fe9ea6c3
-
SSDEEP
768:8t2jLpSET7UCC3HXpfgy35R5/uYmLHmgAVORZOL/:a2jL8UUnZYa5RpkmgA8RZU/
Static task
static1
Behavioral task
behavioral1
Sample
6890_output.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6890_output.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
6890_output.vbs
Resource
win10ltsc2021-20241023-en
Malware Config
Extracted
asyncrat
0.5.8
Default
87.120.113.125:55644
WzRdrlEJS302
-
delay
3
-
install
true
-
install_file
dwmm.exe
-
install_folder
%AppData%
Targets
-
-
Target
6890_output.vbs
-
Size
46KB
-
MD5
653bf44f38fbe35cb4a51a366cce85e1
-
SHA1
5f08110e8b8174d62eb8beb3d8eedf507dc6471c
-
SHA256
0442d85e2af50c1f41e7cbf46850a204cf7cfd49eb5f0244e8b60cc28c313c24
-
SHA512
ed5c78d769eed4667ce8cceb14af498fcf41c36db88e47611f2157708513955a188a9aa60404cb99f632ca2b10596dfad60df3a9320083b92da14529ebdded19
-
SSDEEP
768:msJNohJ2GoBFClzkP/TFYgZutKI/OLixhGpOQU40GmaXQq9+RfomiJrW7PuA9:mTWGsClzkmtKIxGp1UOmWYfomiKH
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops file in System32 directory
-