General
-
Target
raokfhsjdgfb.exe
-
Size
47KB
-
Sample
241211-1rmj2stqhq
-
MD5
750a92e39718ae101d63a8e6c11ba788
-
SHA1
8619dc026b09a14cd92c8521e700b702ffe25507
-
SHA256
bd1736e672b3766e998c37fae9aaf8e381bc9300538e1533f97f88dc4c706817
-
SHA512
a8c32a3adb01473f10023be9b9757d638ac3006f13ea9c5d4a664a9af0d0a4cebff33ca8dd537d87ba083cb99b4f2f187636d158ec2a1d96e4089354c5648d39
-
SSDEEP
768:kuY69T3kH1jWUvTqRmo2qbz7njNrPaPIlsR10bPHefQB1AL2UWBDZcx:kuY69T34y2gNPlskbP+fzL2Vdcx
Behavioral task
behavioral1
Sample
raokfhsjdgfb.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
weak-onions-tap.loca.lt:6606
weak-onions-tap.loca.lt:7707
weak-onions-tap.loca.lt:8808
kal8dl52UUgv
-
delay
3
-
install
true
-
install_file
roar.exe
-
install_folder
%AppData%
Targets
-
-
Target
raokfhsjdgfb.exe
-
Size
47KB
-
MD5
750a92e39718ae101d63a8e6c11ba788
-
SHA1
8619dc026b09a14cd92c8521e700b702ffe25507
-
SHA256
bd1736e672b3766e998c37fae9aaf8e381bc9300538e1533f97f88dc4c706817
-
SHA512
a8c32a3adb01473f10023be9b9757d638ac3006f13ea9c5d4a664a9af0d0a4cebff33ca8dd537d87ba083cb99b4f2f187636d158ec2a1d96e4089354c5648d39
-
SSDEEP
768:kuY69T3kH1jWUvTqRmo2qbz7njNrPaPIlsR10bPHefQB1AL2UWBDZcx:kuY69T34y2gNPlskbP+fzL2Vdcx
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-