General
-
Target
PO# 329UUV11772020,pdf.scr
-
Size
388KB
-
Sample
200719-3ch6rs7lcs
-
MD5
63389d983d9437251db5a2eaaa37a162
-
SHA1
6eadc7d0b7a0802e936369917b10828cff6f0edb
-
SHA256
bade3d7ef0b9a41875bf73ae0c390e015ba88d4245c40af4dc8ec9358fcaf022
-
SHA512
b6c71135bd586e383afd3bbca5addf388dcc7a1822f25c77796aba26b8900585b1dc32f7a1b9fd3923e9e7026a75f5f713e5f7ac8d1976ecafa22de6e5590f58
Static task
static1
Behavioral task
behavioral1
Sample
PO# 329UUV11772020,pdf.scr
Resource
win7
Behavioral task
behavioral2
Sample
PO# 329UUV11772020,pdf.scr
Resource
win10
Malware Config
Extracted
asyncrat
0.5.7B
206.123.129.103:5456
AsyncMutex_6SI8OkPnk
-
aes_key
ryZCn1ygjcLoNCnkQ835nGRczqsX5iGY
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
206.123.129.103
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
5456
-
version
0.5.7B
Targets
-
-
Target
PO# 329UUV11772020,pdf.scr
-
Size
388KB
-
MD5
63389d983d9437251db5a2eaaa37a162
-
SHA1
6eadc7d0b7a0802e936369917b10828cff6f0edb
-
SHA256
bade3d7ef0b9a41875bf73ae0c390e015ba88d4245c40af4dc8ec9358fcaf022
-
SHA512
b6c71135bd586e383afd3bbca5addf388dcc7a1822f25c77796aba26b8900585b1dc32f7a1b9fd3923e9e7026a75f5f713e5f7ac8d1976ecafa22de6e5590f58
Score10/10-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-