General
-
Target
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
-
Size
17.1MB
-
Sample
250208-zl3hmsvkep
-
MD5
4ba81cd6a16ffd3bf5e0e7338df60a5f
-
SHA1
e92ec4e696661c50d2ccbe05e44d19c413f58d18
-
SHA256
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c
-
SHA512
3113b8c8eb65a3a927c10762d24fd871fa9ca29df2f5121272b6a8e46ec48a8cd1b6957ebfa4bc70084e68f14cf7eeb5f676c7d65672fe0aa0a4865a78c1c26c
-
SSDEEP
393216:/Fj0IBCLzNxfYrp0ei6EMF9AFulgy8k7JaajjfHnDY5Su:/FXBmNOrpHi6E0Uk7wSnk
Static task
static1
Behavioral task
behavioral1
Sample
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
Resource
win10v2004-20250207-en
Malware Config
Extracted
asyncrat
v1.2.2
Default
27.124.4.150:51311
owgonhhweps
-
delay
5
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c.exe
-
Size
17.1MB
-
MD5
4ba81cd6a16ffd3bf5e0e7338df60a5f
-
SHA1
e92ec4e696661c50d2ccbe05e44d19c413f58d18
-
SHA256
683f0e829eeb0860f19ac325bb399d4bb4837d9c011ac018fee6118490a1666c
-
SHA512
3113b8c8eb65a3a927c10762d24fd871fa9ca29df2f5121272b6a8e46ec48a8cd1b6957ebfa4bc70084e68f14cf7eeb5f676c7d65672fe0aa0a4865a78c1c26c
-
SSDEEP
393216:/Fj0IBCLzNxfYrp0ei6EMF9AFulgy8k7JaajjfHnDY5Su:/FXBmNOrpHi6E0Uk7wSnk
-
Asyncrat family
-
Venomrat family
-
Async RAT payload
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Discovery
Network Service Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
4System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1