General
-
Target
AsyncClient.exe
-
Size
45KB
-
Sample
241220-wt38cs1lgt
-
MD5
cb1e372373b48ed46beb8165664a8a2e
-
SHA1
eb3047ed673aa5a4251fcd08b3c9a46276a66865
-
SHA256
c4fc07ee159833de867dba73696d99b8204af6155c532966f7f05b88eddc33ee
-
SHA512
9b71a1fb6e0f5460897e962ef0d5feb7d30a1641230cc6c65e2a77091f57cd809ab91ae77b0ef0ae6c8a988021761c65cde58fbd9748eecddf411d4ae3266e36
-
SSDEEP
768:+uynFTMIGZ8btAWUu7y6mo2q8YKjPGaG6PIyzjbFgX3iLsjiBYzizYdNmBDZqx:+uynFTMtkf2MKTkDy3bCXSQOK+YdNodo
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.0.174:8808
WjV4Z2ndPKB4
-
delay
3
-
install
true
-
install_file
dad.exe
-
install_folder
%AppData%
Targets
-
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
cb1e372373b48ed46beb8165664a8a2e
-
SHA1
eb3047ed673aa5a4251fcd08b3c9a46276a66865
-
SHA256
c4fc07ee159833de867dba73696d99b8204af6155c532966f7f05b88eddc33ee
-
SHA512
9b71a1fb6e0f5460897e962ef0d5feb7d30a1641230cc6c65e2a77091f57cd809ab91ae77b0ef0ae6c8a988021761c65cde58fbd9748eecddf411d4ae3266e36
-
SSDEEP
768:+uynFTMIGZ8btAWUu7y6mo2q8YKjPGaG6PIyzjbFgX3iLsjiBYzizYdNmBDZqx:+uynFTMtkf2MKTkDy3bCXSQOK+YdNodo
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-