General
-
Target
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22
-
Size
13.0MB
-
Sample
250326-xxw4wstjw5
-
MD5
66f293c1394e81b02da06a86f5bcb249
-
SHA1
ac0b8acc5eb9395d6a8a40be01a3e75a7208e23c
-
SHA256
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22
-
SHA512
b3bd8252473e9960cdf32d3d89e6f1df3ced96621ae12d085e58705dd12803d5a3e90e1a6899545921f7f32f2bf9072fd26d147a0dd2fb4d3edc21f0a756ca1e
-
SSDEEP
393216:mtoHOLHsaSZ2pczKc1esHdZYjzGLO51D6GCoJ:NOL7mH9ZEN5h6RE
Static task
static1
Behavioral task
behavioral1
Sample
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
Default
127.0.0.1:3001
108.252.227.16:3001
-
delay
1
-
install
true
-
install_file
dsg$4yt.exe
-
install_folder
%AppData%
Extracted
metasploit
metasploit_stager
0.0.0.0:3000
Targets
-
-
Target
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22
-
Size
13.0MB
-
MD5
66f293c1394e81b02da06a86f5bcb249
-
SHA1
ac0b8acc5eb9395d6a8a40be01a3e75a7208e23c
-
SHA256
00421ec0e50c06c0d20a438de1d7f355b02ac6bec317bb4493fee4e291833f22
-
SHA512
b3bd8252473e9960cdf32d3d89e6f1df3ced96621ae12d085e58705dd12803d5a3e90e1a6899545921f7f32f2bf9072fd26d147a0dd2fb4d3edc21f0a756ca1e
-
SSDEEP
393216:mtoHOLHsaSZ2pczKc1esHdZYjzGLO51D6GCoJ:NOL7mH9ZEN5h6RE
-
Asyncrat family
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies Windows Defender Real-time Protection settings
-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1