General
-
Target
2.3.3.exe
-
Size
1.7MB
-
Sample
241226-2ce24atkcp
-
MD5
6eb122e96a700bd2b8cc99145e341dca
-
SHA1
cb7b638457cc0c9d91f2d160cff668be728e98e7
-
SHA256
7fdd01a97937e772442349582da60906c7af11674de1d2e7b5d8ef735d541310
-
SHA512
a58e58533c58adc4e247d7a8e9f96034e04083b58d24b4f31ce191722978a2544d620e44d54ede8956698267dda2466303085d2f4b013859d928e915551d73e4
-
SSDEEP
24576:m9ohkx17Y1hjhLYgHZ/3n9xNGEDx6sjoduqJaa+WB0cmukAoArSnw4GTNL2aa3/K:2skxe1/vNG2jSuryBJoeSnw4uO
Static task
static1
Behavioral task
behavioral1
Sample
2.3.3.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
0.5.8
ahk
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
ZCYbbgUqVRxZ
-
delay
3
-
install
false
-
install_file
powerhouse.exe
-
install_folder
%AppData%
Targets
-
-
Target
2.3.3.exe
-
Size
1.7MB
-
MD5
6eb122e96a700bd2b8cc99145e341dca
-
SHA1
cb7b638457cc0c9d91f2d160cff668be728e98e7
-
SHA256
7fdd01a97937e772442349582da60906c7af11674de1d2e7b5d8ef735d541310
-
SHA512
a58e58533c58adc4e247d7a8e9f96034e04083b58d24b4f31ce191722978a2544d620e44d54ede8956698267dda2466303085d2f4b013859d928e915551d73e4
-
SSDEEP
24576:m9ohkx17Y1hjhLYgHZ/3n9xNGEDx6sjoduqJaa+WB0cmukAoArSnw4GTNL2aa3/K:2skxe1/vNG2jSuryBJoeSnw4uO
-
Asyncrat family
-
Async RAT payload
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-