General
-
Target
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c
-
Size
450KB
-
Sample
241214-yhvg7aslav
-
MD5
15dd038348ef3ed32cd87b133099d3a3
-
SHA1
f4715268ad9ba4b04b19336520f757c9f4b281bb
-
SHA256
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c
-
SHA512
9dd03c4016df5f4640200abc9969b0065741a68ccbc47afbf6715e1b8b35155e995aa09d15c31572b0ae908c73bc88d3f0a7bb03b2b3845797c26c2620698dcc
-
SSDEEP
12288:SODj9CW7P/njixh2wwh4wsaW0xRc6DYe8aQe76EaJ:/Dj9vL/jixh2wwhMZe8aGEa
Static task
static1
Behavioral task
behavioral1
Sample
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
5.tcp.eu.ngrok.io:5555
5.tcp.eu.ngrok.io:12811
E7ieq51pSCWw
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c
-
Size
450KB
-
MD5
15dd038348ef3ed32cd87b133099d3a3
-
SHA1
f4715268ad9ba4b04b19336520f757c9f4b281bb
-
SHA256
a027fa726a76a8afcac68958ff7f72d27d2067b9ec4c13d666d5825226821b8c
-
SHA512
9dd03c4016df5f4640200abc9969b0065741a68ccbc47afbf6715e1b8b35155e995aa09d15c31572b0ae908c73bc88d3f0a7bb03b2b3845797c26c2620698dcc
-
SSDEEP
12288:SODj9CW7P/njixh2wwh4wsaW0xRc6DYe8aQe76EaJ:/Dj9vL/jixh2wwhMZe8aGEa
Score10/10-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-