General
-
Target
packetinjector.exe
-
Size
56KB
-
Sample
241222-a6whdswney
-
MD5
2a89c71539aea7e20f15469ec6bed996
-
SHA1
7765fbdecda515f0046bd15b134851f919617ebd
-
SHA256
cc6e66c0672e82d334213a6a8d8b7e7246d658b9aa5454342de8c5ac43ac7f1a
-
SHA512
ce95772617f97c57dc4cf56dff6827e79ffc586fbd62ecaa3ba5fcd1c31c87749fdeabf6f2c350f356d3a03510165f43dc4a71f57b71ea420ccee28446fcbe48
-
SSDEEP
1536:yuIadTYUN2eTBWfGLGbaZPE3RoXpCdHd0CRoF/:yuIeTYUN2YBWfGqbaZAoX8HeF/
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:16052
127.0.0.1:7000
serveo.net:6606
serveo.net:7707
serveo.net:8808
serveo.net:16052
serveo.net:7000
0.tcp.eu.ngrok.io:6606
0.tcp.eu.ngrok.io:7707
0.tcp.eu.ngrok.io:8808
0.tcp.eu.ngrok.io:16052
0.tcp.eu.ngrok.io:7000
4dmeA4NOupaJ
-
delay
3
-
install
true
-
install_file
VantaPatcher.exe
-
install_folder
%AppData%
Targets
-
-
Target
packetinjector.exe
-
Size
56KB
-
MD5
2a89c71539aea7e20f15469ec6bed996
-
SHA1
7765fbdecda515f0046bd15b134851f919617ebd
-
SHA256
cc6e66c0672e82d334213a6a8d8b7e7246d658b9aa5454342de8c5ac43ac7f1a
-
SHA512
ce95772617f97c57dc4cf56dff6827e79ffc586fbd62ecaa3ba5fcd1c31c87749fdeabf6f2c350f356d3a03510165f43dc4a71f57b71ea420ccee28446fcbe48
-
SSDEEP
1536:yuIadTYUN2eTBWfGLGbaZPE3RoXpCdHd0CRoF/:yuIeTYUN2YBWfGqbaZAoX8HeF/
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-