General
-
Target
Infected.exe
-
Size
63KB
-
Sample
250101-f32g5aylfj
-
MD5
465ede1eb1f9dc421b1a16fa413be9dc
-
SHA1
156743b43466b25ba4bcf80fa94fd69092a98e0a
-
SHA256
ac411f526ad10937acd9adf0e2342b6cf807efc8da8ccb1efffbbc26baf0d5d3
-
SHA512
9048d86d340d3cf10e958d5949b0ee41672a07c5244c34ea5d94542f27bd92f94babdda049573b866aa4b2cec0940b5724f932a7df35b640c57d7d3af6f48ec4
-
SSDEEP
768:SZzGUy/pr78PIC8A+XXlazcBRL5JTk1+T4KSBGHmDbD/ph0oXrPXpxmskXiSu0dP:YkphzdSJYUbdh9txmtXVu0dpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
What
127.0.0.1:1337
127.0.0.1:26550
147.185.221.24:1337
147.185.221.24:26550
-
delay
3
-
install
true
-
install_file
Windows Defender.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
465ede1eb1f9dc421b1a16fa413be9dc
-
SHA1
156743b43466b25ba4bcf80fa94fd69092a98e0a
-
SHA256
ac411f526ad10937acd9adf0e2342b6cf807efc8da8ccb1efffbbc26baf0d5d3
-
SHA512
9048d86d340d3cf10e958d5949b0ee41672a07c5244c34ea5d94542f27bd92f94babdda049573b866aa4b2cec0940b5724f932a7df35b640c57d7d3af6f48ec4
-
SSDEEP
768:SZzGUy/pr78PIC8A+XXlazcBRL5JTk1+T4KSBGHmDbD/ph0oXrPXpxmskXiSu0dP:YkphzdSJYUbdh9txmtXVu0dpqKmY7
Score10/10-
Asyncrat family
-
Async RAT payload
-
Renames multiple (1279) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-