General
-
Target
AsyncClient.exe
-
Size
47KB
-
Sample
250130-27x66avphy
-
MD5
f06fbe928d0b97d4aacb1370a258ffb5
-
SHA1
f2d4ca100ae403557d209ca467fa07179802df09
-
SHA256
61872ee6c75b35f80c3279c549d9d3457fb2557166f2628716ee41e36c03f92c
-
SHA512
cd2afec901a8aa643ef4448c814704d5928e6975e547c0af0b366e4855b01e551d191f8dffe1b3b86a424a7e0d308cc0303bf3418358696cba6c74e160497cba
-
SSDEEP
768:wued1TYQZ3VWU1ymhbvmo2qjB4gNaoGGPIzsKZuEK/qR/7Yb8qDdXUVgLZc1yq+4:wued1TYiFhN2poGvJZuEK/kkb8udEWOb
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10ltsc2021-20250128-en
Malware Config
Extracted
asyncrat
0.5.8
WinScript
WmNVpZFGaUkb
-
delay
3
-
install
true
-
install_file
winscript.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/MWg2CxEm
Targets
-
-
Target
AsyncClient.exe
-
Size
47KB
-
MD5
f06fbe928d0b97d4aacb1370a258ffb5
-
SHA1
f2d4ca100ae403557d209ca467fa07179802df09
-
SHA256
61872ee6c75b35f80c3279c549d9d3457fb2557166f2628716ee41e36c03f92c
-
SHA512
cd2afec901a8aa643ef4448c814704d5928e6975e547c0af0b366e4855b01e551d191f8dffe1b3b86a424a7e0d308cc0303bf3418358696cba6c74e160497cba
-
SSDEEP
768:wued1TYQZ3VWU1ymhbvmo2qjB4gNaoGGPIzsKZuEK/qR/7Yb8qDdXUVgLZc1yq+4:wued1TYiFhN2poGvJZuEK/kkb8udEWOb
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-