General
-
Target
Dc.exe
-
Size
47KB
-
Sample
250107-xcna9avpgj
-
MD5
ff744d24089c2b37d56b4483c6db217a
-
SHA1
4de25b3c976c958aa83d868ee4e8f891b1df1ef2
-
SHA256
3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8
-
SHA512
fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc
-
SSDEEP
768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
necatisoff-36486.portmap.host:36486
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
wdf.exe
-
install_folder
%Temp%
Targets
-
-
Target
Dc.exe
-
Size
47KB
-
MD5
ff744d24089c2b37d56b4483c6db217a
-
SHA1
4de25b3c976c958aa83d868ee4e8f891b1df1ef2
-
SHA256
3afbdfdaf9738f85294d3b1179e6e3200b8aeccfb38b9caf8dd6c25ac9f5bdb8
-
SHA512
fa84b86856665619b2a720db84c92beacf0dcbca976cc29ed2018a7d07afab6a2d29e4d07dc060a5a98e029adcdb6d247e4585bbf59fdd75be4c00721234ddbc
-
SSDEEP
768:Zy+0zzILMmY4+jiRUvi56lxYbIgezKD6cGpIvEgK/JDZVc6KN:E+SQR8sbfzD6/InkJDZVclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-