General
-
Target
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100
-
Size
262KB
-
Sample
250329-xz1j4azzav
-
MD5
bb3d025def36b30d2fb3f442995fba03
-
SHA1
6c19a62c2823afce16fd56c9f7ca3fc34c04d49b
-
SHA256
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100
-
SHA512
22322032c27e91970b4907cb2d14d889dffdc95f9914788a4f312518bb9b3172eb70bbbd8a32879b28d6fbe24ca721c8424c0c0dac3e247f2424ef318ab789e1
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/eX:WFzDqa86hV6uRRqX1evPlwAw
Static task
static1
Behavioral task
behavioral1
Sample
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100
-
Size
262KB
-
MD5
bb3d025def36b30d2fb3f442995fba03
-
SHA1
6c19a62c2823afce16fd56c9f7ca3fc34c04d49b
-
SHA256
85d9a7d75ece0120c82dd2980532c1c4eb4e5a76e58a228aeec21aebc307a100
-
SHA512
22322032c27e91970b4907cb2d14d889dffdc95f9914788a4f312518bb9b3172eb70bbbd8a32879b28d6fbe24ca721c8424c0c0dac3e247f2424ef318ab789e1
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/eX:WFzDqa86hV6uRRqX1evPlwAw
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-