General
-
Target
Infected.exe
-
Size
63KB
-
Sample
250401-egv8jsszbv
-
MD5
fed0b60effd8cab7e785fc3873ef3b92
-
SHA1
a083c6049c44010287b867e5112361d56c829bed
-
SHA256
a4fb56b773918ec655178306ffa105b0eba503dc772bd8a71af298194a3d7f8f
-
SHA512
9d4af762624f8314a23f03329d7121982df4b16354fca3211bd12a3b252505a5896fffd1c075672b7defac16d951960ba8e532cbe2abc3995b0f759accd4e124
-
SSDEEP
768:ZJiBeNf5g78fIC8A+XayazcBRL5JTk1+T4KSBGHmDbD/ph0oXT47VSukdpqKYhY7:Oq5UZdSJYUbdh9T4AukdpqKmY7
Behavioral task
behavioral1
Sample
Infected.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
asyncrat
f9t
127.0.0.1:1111
127.0.0.1:34057
rules-binary.gl.at.ply.gg:1111
rules-binary.gl.at.ply.gg:34057
-
delay
1
-
install
true
-
install_file
test.exe
-
install_folder
%AppData%
Targets
-
-
Target
Infected.exe
-
Size
63KB
-
MD5
fed0b60effd8cab7e785fc3873ef3b92
-
SHA1
a083c6049c44010287b867e5112361d56c829bed
-
SHA256
a4fb56b773918ec655178306ffa105b0eba503dc772bd8a71af298194a3d7f8f
-
SHA512
9d4af762624f8314a23f03329d7121982df4b16354fca3211bd12a3b252505a5896fffd1c075672b7defac16d951960ba8e532cbe2abc3995b0f759accd4e124
-
SSDEEP
768:ZJiBeNf5g78fIC8A+XayazcBRL5JTk1+T4KSBGHmDbD/ph0oXT47VSukdpqKYhY7:Oq5UZdSJYUbdh9T4AukdpqKmY7
-
Asyncrat family
-
Stealerium family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-