General
-
Target
image logger.exe
-
Size
48KB
-
Sample
250109-layhnawkay
-
MD5
505210a90b66dceef47778cafebf7f6d
-
SHA1
c593d5f8b4aa53c59d2568ba02e935c6a7650a1e
-
SHA256
4f009430e013267656dca53381d5dbbf0ea5dbb695d87fcf92e8109c836efd58
-
SHA512
992176faa1c037bdf33dd9686b49d3115f457d7b1de8b9fc36b1e59d85ac1a446ba186941c40e5c6b9da88fd27bd746c026cb028a10004c5d27e6e4419e11c23
-
SSDEEP
768:TFWgtBBILDmY1+VxiZRkHigH8Ybug0ABsNqT5uvEgK/JfZVc6KN:TFDak8ZRkRzbR0+sNqtunkJfZVclN
Behavioral task
behavioral1
Sample
image logger.exe
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
1.0.7
Default
DcRatMutex_qwqdanchun
-
c2_url_file
https://Pastebin.com/raw/fevFJe98
-
delay
1
-
install
true
-
install_file
image logger.exe
-
install_folder
%AppData%
Targets
-
-
Target
image logger.exe
-
Size
48KB
-
MD5
505210a90b66dceef47778cafebf7f6d
-
SHA1
c593d5f8b4aa53c59d2568ba02e935c6a7650a1e
-
SHA256
4f009430e013267656dca53381d5dbbf0ea5dbb695d87fcf92e8109c836efd58
-
SHA512
992176faa1c037bdf33dd9686b49d3115f457d7b1de8b9fc36b1e59d85ac1a446ba186941c40e5c6b9da88fd27bd746c026cb028a10004c5d27e6e4419e11c23
-
SSDEEP
768:TFWgtBBILDmY1+VxiZRkHigH8Ybug0ABsNqT5uvEgK/JfZVc6KN:TFDak8ZRkRzbR0+sNqtunkJfZVclN
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-