General
-
Target
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f
-
Size
272KB
-
Sample
250329-ywqfdsztgs
-
MD5
ddd9a73f6b017c6839674d5e6f665c3f
-
SHA1
cb3f1debb913d6cafab38102c9f35b6450c3a3ac
-
SHA256
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f
-
SHA512
41ef3b93154675266266dde5bbf579f54931ed3295ccaf1f2817201dbab3f07c1632f3c57a21f8d1bc9cdd02eba2f05735c946e6a4e17096e5ac7040b2cb0aa6
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdTo:WFzDqa86hV6uRRqX1evPlwAEdM
Static task
static1
Behavioral task
behavioral1
Sample
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f
-
Size
272KB
-
MD5
ddd9a73f6b017c6839674d5e6f665c3f
-
SHA1
cb3f1debb913d6cafab38102c9f35b6450c3a3ac
-
SHA256
1bd13a28f62855a85170033ee25f73c387b512b0042be9314981887074393d0f
-
SHA512
41ef3b93154675266266dde5bbf579f54931ed3295ccaf1f2817201dbab3f07c1632f3c57a21f8d1bc9cdd02eba2f05735c946e6a4e17096e5ac7040b2cb0aa6
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdTo:WFzDqa86hV6uRRqX1evPlwAEdM
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-