General
-
Target
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
-
Size
6.1MB
-
Sample
250118-cfg87azket
-
MD5
192bcd791eac82426c69c1496d9059e5
-
SHA1
036019f9b93f2b2cb80fa251fe769203994e0ae2
-
SHA256
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9
-
SHA512
e774a0a47ec7931a1928ac22f54c65089a340e24cb87fd9b59cf64e8ad203e0bd904da997318ff5c9f0aceddce70dfa415bfae053d97db374adff7cbbe03d3e0
-
SSDEEP
98304:66nonNZnR83jP+0g/7/DXj6Bi/cwIofEbo4P4HwsffoOX1g8:6WATR8zP/gD/DfP7WqfoOq8
Static task
static1
Behavioral task
behavioral1
Sample
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
metasploit_stager
5.75.234.8:5050
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot7694252704:AAGfHKTqga3d5HbNfwWi6gV-IxgHteCjH7w/getM
Targets
-
-
Target
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9.exe
-
Size
6.1MB
-
MD5
192bcd791eac82426c69c1496d9059e5
-
SHA1
036019f9b93f2b2cb80fa251fe769203994e0ae2
-
SHA256
00f0c2f3687ab8bf0990084d1e3af62246005c32084fa598aca1d65bdc0740c9
-
SHA512
e774a0a47ec7931a1928ac22f54c65089a340e24cb87fd9b59cf64e8ad203e0bd904da997318ff5c9f0aceddce70dfa415bfae053d97db374adff7cbbe03d3e0
-
SSDEEP
98304:66nonNZnR83jP+0g/7/DXj6Bi/cwIofEbo4P4HwsffoOX1g8:6WATR8zP/gD/DfP7WqfoOq8
-
Asyncrat family
-
Gurcu family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Async RAT payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-