General
-
Target
Client.exe
-
Size
48KB
-
Sample
250102-1kntjazlen
-
MD5
c455e1785b15f7ab254cfc3418803921
-
SHA1
9164b636c9e11d1060009de5100a6b60e5f37837
-
SHA256
7d7fefea4821294e42f1848ec0d0512398d53d75fad6130cf7d47384378d7bca
-
SHA512
0b3acca31da5d6a477ecf36b4a97d2c2e76fae7b6663024222934304da46043a93ddead5551c402d47d709b89854f8d66b807f3f8d52911be3bfc5e26ef4eb2d
-
SSDEEP
768:AWgtBBILDmY1+Vxi4telDSN+iV08YbygetBrUyvvEgK/JkEVc6KN:ADak84tKDs4zb1wB4yvnkJkEVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
GoogleUpdate.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rN9BXgA1
Targets
-
-
Target
Client.exe
-
Size
48KB
-
MD5
c455e1785b15f7ab254cfc3418803921
-
SHA1
9164b636c9e11d1060009de5100a6b60e5f37837
-
SHA256
7d7fefea4821294e42f1848ec0d0512398d53d75fad6130cf7d47384378d7bca
-
SHA512
0b3acca31da5d6a477ecf36b4a97d2c2e76fae7b6663024222934304da46043a93ddead5551c402d47d709b89854f8d66b807f3f8d52911be3bfc5e26ef4eb2d
-
SSDEEP
768:AWgtBBILDmY1+Vxi4telDSN+iV08YbygetBrUyvvEgK/JkEVc6KN:ADak84tKDs4zb1wB4yvnkJkEVclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-