General
-
Target
7796_output.zip
-
Size
40KB
-
Sample
241209-zk575s1jcv
-
MD5
bd3ab05ca9eb6161d66948bba2a09c09
-
SHA1
90e6d4c9e592e4a2ecd447e98830f3755acbe760
-
SHA256
5e34ea7fbf3080fe5b5ad6fb5a1a3f9b11e783dc8cda28985e048970256831c3
-
SHA512
86e31d424f90be6d08b29b0b952ec1f2e12d4d2dca90a52aed3038fa26d6bb6b0771276c7bf795cde36eeea340eb8a649871c6015dbf1eacc5b247dab7b0a377
-
SSDEEP
768:b8gNuyQsESayRkeA22lv3CL2CSn/OaEgoazkELsSlIIZ8+/iUwt4FmJ:b8gAPsExheA3lFC42VgRzk85ZP/aCFq
Static task
static1
Behavioral task
behavioral1
Sample
9765_output.vbs
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9765_output.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
9765_output.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
9765_output.vbs
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
9765_output.vbs
Resource
macos-20241106-en
Malware Config
Extracted
asyncrat
0.5.8
Default
jt8iyre.localto.net:55644
jt8iyre.localto.net:2101
WzRdrlEJS302
-
delay
3
-
install
false
-
install_file
dwmm.exe
-
install_folder
%AppData%
Targets
-
-
Target
9765_output.vbs
-
Size
69KB
-
MD5
f0a90fbc29a64f4274b014755f88c990
-
SHA1
e8f7053bea6eab342edf9d80c15835b6fb6d9844
-
SHA256
df37f986e4342d26e408aa370058ba21d218aaac358ba940bde7ac1f035549d7
-
SHA512
fc42c09434d77f5688d23eab7700440196d07e517e3940d3b47484f2c4de214301063b9537febf1f3396fcf033cead22b4aecd68f18acc7c6f06f8f06ffc3c77
-
SSDEEP
768:Oyq+h3xb1DhEhMXSHLGjhlZrkoq22Ub9aLILRNho4rBT9qDCJfJw/urPFpjw4g:lhBJihvKjhbQoDNbUILRUcE4wWrtp0D
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-