General
-
Target
Client.exe
-
Size
47KB
-
Sample
250302-swhgwsxps2
-
MD5
86342644c9b86db7318560eccad4387d
-
SHA1
90942a986c08fe6f308912a99b44413405ce3392
-
SHA256
2bb183b9da31dc9327ba06a935fdcb235747e49643b173c490adc39629b0f9e5
-
SHA512
e7d49dd0c0ebe430623be21fb8743dc4bb627d97dc98884adc8912e247552f84785a0d6a4e7c31a04b620a0b08f12867abd33e3a8be7ca3308ed140091805cb9
-
SSDEEP
768:sWmfbILUWQw+jiVtelDSN+iV08YbygeV5C47pvC8tKvEgK/JbZVc6KN:sWmV4VtKDs4zb1o537pvC8tKnkJbZVcD
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
asyncrat
1.0.7
Default
C0re-50342.portmap.host:50342
asdas7dcad4ca9sdca7sdc
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Targets
-
-
Target
Client.exe
-
Size
47KB
-
MD5
86342644c9b86db7318560eccad4387d
-
SHA1
90942a986c08fe6f308912a99b44413405ce3392
-
SHA256
2bb183b9da31dc9327ba06a935fdcb235747e49643b173c490adc39629b0f9e5
-
SHA512
e7d49dd0c0ebe430623be21fb8743dc4bb627d97dc98884adc8912e247552f84785a0d6a4e7c31a04b620a0b08f12867abd33e3a8be7ca3308ed140091805cb9
-
SSDEEP
768:sWmfbILUWQw+jiVtelDSN+iV08YbygeV5C47pvC8tKvEgK/JbZVc6KN:sWmV4VtKDs4zb1o537pvC8tKnkJbZVcD
-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Modifies Windows Defender Real-time Protection settings
-
UAC bypass
-
Async RAT payload
-
Renames multiple (3209) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Windows security modification
-
Checks whether UAC is enabled
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1