General
-
Target
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
-
Size
47KB
-
Sample
250421-xz7cmsswfy
-
MD5
8a157f3fc0ea3d6b8644b918b610947e
-
SHA1
095c33d5b86fd75d76619cffd6259badb5d1b03e
-
SHA256
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
-
SHA512
f2584732363237d6e409c6f0c0c7f038c67df2ae31df92bbed3431afa60495955b896d8a5bf7a913c876e5c7446b9fedab70d040832b82b32dbc5d43c461fc38
-
SSDEEP
768:6uW81Towx/9WU9Vt+Xmo2qzgTRVTzuuSPIG5RorYKN8n5b0bK78dpNXbpl3rePD+:6uW81Toq7C2fFz97kRaYKN3bK4dfXaF8
Behavioral task
behavioral1
Sample
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
5.tcp.eu.ngrok.io:15310
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Valorantbuild.exe
-
install_folder
%AppData%
Targets
-
-
Target
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
-
Size
47KB
-
MD5
8a157f3fc0ea3d6b8644b918b610947e
-
SHA1
095c33d5b86fd75d76619cffd6259badb5d1b03e
-
SHA256
fba348d623f8cd0af63315a97ff67a51e0af864fb07c02824cbd83dafb173f8e
-
SHA512
f2584732363237d6e409c6f0c0c7f038c67df2ae31df92bbed3431afa60495955b896d8a5bf7a913c876e5c7446b9fedab70d040832b82b32dbc5d43c461fc38
-
SSDEEP
768:6uW81Towx/9WU9Vt+Xmo2qzgTRVTzuuSPIG5RorYKN8n5b0bK78dpNXbpl3rePD+:6uW81Toq7C2fFz97kRaYKN3bK4dfXaF8
-
Asyncrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-