General
-
Target
FLXTOOLS.exe
-
Size
63KB
-
Sample
250104-d1nr5sypes
-
MD5
8b3affb035dc48cb81e416570ee9889a
-
SHA1
bb8b2cd080000afe9b35bf923897acd6df5054f3
-
SHA256
6b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad
-
SHA512
8f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66
-
SSDEEP
768:EpDxI6PfZ778/IC8A+X3GDXKc5t+cV48Jg1+T4nSGGHmDbD0ph0oXrvRXtSuMdph:262ZBmDXHwcKUpUbqh9LdcuMdpqKmY7
Behavioral task
behavioral1
Sample
FLXTOOLS.exe
Resource
win7-20240729-en
Malware Config
Extracted
asyncrat
FLXTOOLS
ohio-darkness.gl.at.ply.gg:13836
-
delay
1
-
install
true
-
install_file
FLXTOOLS.exe
-
install_folder
%AppData%
Targets
-
-
Target
FLXTOOLS.exe
-
Size
63KB
-
MD5
8b3affb035dc48cb81e416570ee9889a
-
SHA1
bb8b2cd080000afe9b35bf923897acd6df5054f3
-
SHA256
6b5c1e03cf018925d9b7e9c5089afe13578f7c56614cd689f23413c13819bdad
-
SHA512
8f221bcbdf1f9a2146c3102e7daee7e4a3877e3fd83d76bf81f9cfd323c4846da8e347ff823629113d6f867909ce3d32e8d4c9f605dac7026258dc10fff71b66
-
SSDEEP
768:EpDxI6PfZ778/IC8A+X3GDXKc5t+cV48Jg1+T4nSGGHmDbD0ph0oXrvRXtSuMdph:262ZBmDXHwcKUpUbqh9LdcuMdpqKmY7
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-