General
-
Target
Client.exe
-
Size
74KB
-
Sample
250331-nd39es1lv9
-
MD5
8858177a6b8c6874dc44570c1d6e47ab
-
SHA1
e5692c7e3198378ef684dc4482599610bc8d1e60
-
SHA256
5e1b238642a824af1333443f125f3e0e699768c9a33be81f899f65fecd4ba86f
-
SHA512
92bfaf9d624c5c05cafff01fa9d21467e99f6f46455f2441e500e3f0f539be12b96968e1c7b96f9cca73141e1326476be58e9b3e7c0d2256685dc2ad55519876
-
SSDEEP
1536:qUsgcxbVzCt+PPMVme9VdQuDI6H1bf/264QzcWLVclN:qU5cxblTPPMVme9VdQsH1bfO64QvBY
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
uhuhlilars
-
delay
3
-
install
true
-
install_file
Windows Font Manager.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/rVJQPNVe
Targets
-
-
Target
Client.exe
-
Size
74KB
-
MD5
8858177a6b8c6874dc44570c1d6e47ab
-
SHA1
e5692c7e3198378ef684dc4482599610bc8d1e60
-
SHA256
5e1b238642a824af1333443f125f3e0e699768c9a33be81f899f65fecd4ba86f
-
SHA512
92bfaf9d624c5c05cafff01fa9d21467e99f6f46455f2441e500e3f0f539be12b96968e1c7b96f9cca73141e1326476be58e9b3e7c0d2256685dc2ad55519876
-
SSDEEP
1536:qUsgcxbVzCt+PPMVme9VdQuDI6H1bf/264QzcWLVclN:qU5cxblTPPMVme9VdQsH1bfO64QvBY
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-