General
-
Target
lec.exe
-
Size
262KB
-
Sample
241211-tahq7stmhn
-
MD5
6afe340c4109d4dc85f4816047d7e036
-
SHA1
f1895f5c5e735ad4164f089567907350f4a0e093
-
SHA256
94d46e8b9788023fe37638002c39e84c3f00c473e69eb8a48efc4f4c058ff100
-
SHA512
9d0149848d18c3637d64b20457df098d2adf5f9d50ea4d591fa266d08083e253c9b81ae0aea8c930331aa32d992060817ccceda4a9fbb5e2b487a605e649ba50
-
SSDEEP
3072:STMdJz1z8Ub7OPk6JEYZTuSEzvi0oqn/YX+hYz:HdPbyPFEYZTuSEzvHvnAOS
Behavioral task
behavioral1
Sample
lec.exe
Resource
win7-20241010-en
Malware Config
Extracted
asyncrat
Default
-
delay
1
-
install
true
-
install_file
update.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/7FziSYnf
Targets
-
-
Target
lec.exe
-
Size
262KB
-
MD5
6afe340c4109d4dc85f4816047d7e036
-
SHA1
f1895f5c5e735ad4164f089567907350f4a0e093
-
SHA256
94d46e8b9788023fe37638002c39e84c3f00c473e69eb8a48efc4f4c058ff100
-
SHA512
9d0149848d18c3637d64b20457df098d2adf5f9d50ea4d591fa266d08083e253c9b81ae0aea8c930331aa32d992060817ccceda4a9fbb5e2b487a605e649ba50
-
SSDEEP
3072:STMdJz1z8Ub7OPk6JEYZTuSEzvi0oqn/YX+hYz:HdPbyPFEYZTuSEzvHvnAOS
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-