General
-
Target
Fixer (1).exe
-
Size
63KB
-
Sample
241231-eed69asqeq
-
MD5
1b13586a90a4197f78ae7fbbb62cd2c3
-
SHA1
b6c29b130e1c3d442e7850de3c5303284685c610
-
SHA256
a1ab0b66e66d84c8687298d71c66e347ac8b22d8ba7b7aedec7867c54ed8a14e
-
SHA512
97002dfd7f4a4b14e489f952f2802b04a1bf2938fb3870bf89dd2998fa56e4531717d117bf872e8d1f601bd6edeac59a73ee262fa3923ba1db8b5ff1541eccb9
-
SSDEEP
768:RdGnVhwdjndk78TQC8A+XiuazcBRL5JTk1+T4KSBGHmDbD/ph0oXpC4AdvCSuAdP:mnSdsNdSJYUbdh9ps1uAdpqKmY7
Behavioral task
behavioral1
Sample
Fixer (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Fixer (1).exe
Resource
win10ltsc2021-20241211-en
Malware Config
Extracted
asyncrat
Default
associated-chevy.gl.at.ply.gg:46398
-
delay
1
-
install
true
-
install_file
System.exe
-
install_folder
%AppData%
Targets
-
-
Target
Fixer (1).exe
-
Size
63KB
-
MD5
1b13586a90a4197f78ae7fbbb62cd2c3
-
SHA1
b6c29b130e1c3d442e7850de3c5303284685c610
-
SHA256
a1ab0b66e66d84c8687298d71c66e347ac8b22d8ba7b7aedec7867c54ed8a14e
-
SHA512
97002dfd7f4a4b14e489f952f2802b04a1bf2938fb3870bf89dd2998fa56e4531717d117bf872e8d1f601bd6edeac59a73ee262fa3923ba1db8b5ff1541eccb9
-
SSDEEP
768:RdGnVhwdjndk78TQC8A+XiuazcBRL5JTk1+T4KSBGHmDbD/ph0oXpC4AdvCSuAdP:mnSdsNdSJYUbdh9ps1uAdpqKmY7
-
Asyncrat family
-
Async RAT payload
-
Renames multiple (3322) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Executes dropped EXE
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1