General
-
Target
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe.vir
-
Size
15.8MB
-
Sample
241211-btgn5stlgl
-
MD5
db5818c5d7a25382f53f6f961b5d04f5
-
SHA1
fe5f8cfd8adf3297a2dd883951ed84af9058721d
-
SHA256
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9
-
SHA512
1b1e3b124dba5666b3e04942b8306836b608fc639664538b70f937b4af6f0473a7d9c9e0fc6565eabc2c24e2d139171c9c227f9c648d464b8c0c346b4f899a21
-
SSDEEP
393216:SpNtz8jMP3N9X4VPpiFPXyK3q3kwaQNnMykEOSc:S3Z3P3N9X24Xlq3xBMz
Static task
static1
Behavioral task
behavioral1
Sample
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
v1.2.2
Default
148.66.1.18:51227
dzglfmbhtesmed
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9.exe.vir
-
Size
15.8MB
-
MD5
db5818c5d7a25382f53f6f961b5d04f5
-
SHA1
fe5f8cfd8adf3297a2dd883951ed84af9058721d
-
SHA256
7c7156bffa25093c47c8d5515b9420f3b02a3d466ba9a564d440f0cc06969ab9
-
SHA512
1b1e3b124dba5666b3e04942b8306836b608fc639664538b70f937b4af6f0473a7d9c9e0fc6565eabc2c24e2d139171c9c227f9c648d464b8c0c346b4f899a21
-
SSDEEP
393216:SpNtz8jMP3N9X4VPpiFPXyK3q3kwaQNnMykEOSc:S3Z3P3N9X24Xlq3xBMz
-
Asyncrat family
-
Async RAT payload
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1