General
-
Target
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9
-
Size
270KB
-
Sample
250105-hvjy8aymak
-
MD5
9cbdfc95c830493af0d8986bfef01f77
-
SHA1
921f7051f9bd6ee4bb7267b8ec8935f7535546cb
-
SHA256
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9
-
SHA512
26f1666affb62214b9fc8f30da91d019b3b432b11bbf3e275b190b4862f6b5c9a931e549bff15274c88429ede945dc94a243bf64ef8066f3c9daeb23707fd162
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdkXhb:WFzDqa86hV6uRRqX1evPlwAEdkXhb
Static task
static1
Behavioral task
behavioral1
Sample
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9
-
Size
270KB
-
MD5
9cbdfc95c830493af0d8986bfef01f77
-
SHA1
921f7051f9bd6ee4bb7267b8ec8935f7535546cb
-
SHA256
df1b41271e250882cc5ce0a2d6f00b863faab7d9e8830358652d015fc1aeedf9
-
SHA512
26f1666affb62214b9fc8f30da91d019b3b432b11bbf3e275b190b4862f6b5c9a931e549bff15274c88429ede945dc94a243bf64ef8066f3c9daeb23707fd162
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdkXhb:WFzDqa86hV6uRRqX1evPlwAEdkXhb
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-