General
-
Target
BLQuote_'PO#385995790.exe
-
Size
392KB
-
Sample
250106-jsxb7s1khv
-
MD5
837f18b7850efc1d72e08b8296665951
-
SHA1
f8764fe781498410e66bde0aacb422cc46bd4dd5
-
SHA256
70dc3a05f4d6138c0a26d6e05d85cadcfddef54db01d6cb48fcb2ff686de2f0a
-
SHA512
ced510b32a57ff55448c4d8c82fe6fe344214b2477f61a771008cc4b92b4050c249619ff581156d3fb83ad6aded6025900704559d0dc1fadc9f7d04e2b225c99
-
SSDEEP
6144:1lpSV36ggqbX5FPKXfRKQ/UahtFu1KJSGtX/Ke4ERP68MjtriKFuMfl0oj6:1lpmlbX5xK0QMaLJ7n4aS8MjtDlt6
Static task
static1
Behavioral task
behavioral1
Sample
BLQuote_'PO#385995790.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
69.174.100.131:6606
abkZfsCYRZhk
-
delay
10
-
install
false
-
install_file
order.exe
-
install_folder
%AppData%
Targets
-
-
Target
BLQuote_'PO#385995790.exe
-
Size
392KB
-
MD5
837f18b7850efc1d72e08b8296665951
-
SHA1
f8764fe781498410e66bde0aacb422cc46bd4dd5
-
SHA256
70dc3a05f4d6138c0a26d6e05d85cadcfddef54db01d6cb48fcb2ff686de2f0a
-
SHA512
ced510b32a57ff55448c4d8c82fe6fe344214b2477f61a771008cc4b92b4050c249619ff581156d3fb83ad6aded6025900704559d0dc1fadc9f7d04e2b225c99
-
SSDEEP
6144:1lpSV36ggqbX5FPKXfRKQ/UahtFu1KJSGtX/Ke4ERP68MjtriKFuMfl0oj6:1lpmlbX5xK0QMaLJ7n4aS8MjtDlt6
-
Asyncrat family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4