General
-
Target
build.exe
-
Size
3.6MB
-
Sample
241229-qvskcsspaw
-
MD5
2005c36df30a92d045d80c76be86d157
-
SHA1
5e821a88c68ca7fc61e7fd88a6127d35c7af3d7f
-
SHA256
b94561e6149960253a8ff55a26fa68c7794b8fced2deade95d6b2e95b5d932af
-
SHA512
ad2c3667101e450566e8b0f7ee3a05c022bed6b1c64007f5c3f21c8bc6e062910c32c93e5b616188fec9d1c625a9a148b42b911d362f6ffd45f2953db38c1275
-
SSDEEP
98304:2kqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13C:2kSIlLtzWAXAkuujCPX9YG9he5GnQCAL
Static task
static1
Behavioral task
behavioral1
Sample
build.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
build.exe
-
Size
3.6MB
-
MD5
2005c36df30a92d045d80c76be86d157
-
SHA1
5e821a88c68ca7fc61e7fd88a6127d35c7af3d7f
-
SHA256
b94561e6149960253a8ff55a26fa68c7794b8fced2deade95d6b2e95b5d932af
-
SHA512
ad2c3667101e450566e8b0f7ee3a05c022bed6b1c64007f5c3f21c8bc6e062910c32c93e5b616188fec9d1c625a9a148b42b911d362f6ffd45f2953db38c1275
-
SSDEEP
98304:2kqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13C:2kSIlLtzWAXAkuujCPX9YG9he5GnQCAL
-
Asyncrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1