General
-
Target
20790276229.zip
-
Size
3.4MB
-
Sample
250115-s5n12axjfw
-
MD5
e36509110661b196b0e7cd0c4b3c3106
-
SHA1
eafc405a7df35a842fa410577ab852fffbb0898b
-
SHA256
0a95f4183ce8b2226160c92031f77b4ba5a1e96728a20e773d120ffa180cbaae
-
SHA512
b1f0d346529f327503a164c04d8bc61af827e0f980aca7e2c35bceb0a1b2fc551b42ba947847d9bd3a77f9fbd831fd87602bf9df0ae253c0cb622f31f76c46a5
-
SSDEEP
98304:PRQmu3qm48hoDPS+XvAvV9ucnqnudIZanRubjbCZ:GmuG82OiGmcnqnudTnig
Static task
static1
Behavioral task
behavioral1
Sample
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2
-
Size
3.6MB
-
MD5
159cb32f97f5a5297b9ef46e16556631
-
SHA1
d9a2cee6035f972e395015c0847ffd491a65b284
-
SHA256
452c77d9be7b82107a1325d98f75d0194e61c311e4fa7204a15b52e42bc3c2d2
-
SHA512
6e974f974d1cb3104e20a51cbe7a636bd81af111ff64784f58a3194acaf6970545436cdc9ee6182a58c168e5aed68a3929baddf0c5227743496ee252136c1e77
-
SSDEEP
98304:2kqXf0FlL9nrYAWAZi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13C:2kSIlLtzWAXAkuujCPX9YG9he5GnQCAL
-
Asyncrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1