General
-
Target
JaffaCakes118_89609c6e1373264312594816f10bb5c7b4c742fd674f1d6c1c87c032df69d673
-
Size
474KB
-
Sample
241222-qshx5szqdn
-
MD5
764db22f48202df2bf9b275aed1d1b41
-
SHA1
81b4ba9d11bb65791c5c88704e9e707665a80bd2
-
SHA256
89609c6e1373264312594816f10bb5c7b4c742fd674f1d6c1c87c032df69d673
-
SHA512
a6bce27d3cea0f397db9050aefda293ee97019d68de53a935305bd397c6e236da697f534c2a7893601b89cced5a7c86108b67286aac5a759d3df1570be6b34ee
-
SSDEEP
12288:oR8BgAQhWrv3B2fKdbYTX9XOyIHbrG4cZ0gdG/52Vn1SJtUp:buAQhuv3kfKdbYTX5I79b+k2V1YSp
Static task
static1
Behavioral task
behavioral1
Sample
38e1bbae005365e92cf80aa6ef199d5107af57fde3afb02c31dc1bde875c68f7.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
37.0.14.198:6161
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
.exe
-
install_folder
%AppData%
Targets
-
-
Target
38e1bbae005365e92cf80aa6ef199d5107af57fde3afb02c31dc1bde875c68f7
-
Size
694KB
-
MD5
32c67f99f3c95ba5e1816ca208f9b723
-
SHA1
c1e29ecea3c87d671448b9dbcc8d8c67b0d14b7e
-
SHA256
38e1bbae005365e92cf80aa6ef199d5107af57fde3afb02c31dc1bde875c68f7
-
SHA512
578526bda2f08948475726f36bf247aabeb8f3941f95153d6786bc0db6e43bad44502ef1757bae2bb7c6f6bd0a4bd51e9b33ae363be293b75f490a26c03795f8
-
SSDEEP
12288:btoKggb2iNdvpc++pd1yIBbrk4ct0gdK/5SVns2M2TgN/0s:5oKgK1XpSpGIZn9+YSVsggi
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-