General
-
Target
invoice-ID3626307348012.vbs
-
Size
324B
-
Sample
210107-6gfete95d6
-
MD5
50f7355426061a1952f878e61e072d5e
-
SHA1
90156383d18b6851298d1c68f0cca24f6c7375fe
-
SHA256
a412a3bdf6e8891fa60734b53430db5d0ac8dce28a764fd013dd767614790c45
-
SHA512
959e8b1cc6eb2e4cf8670567f60aa496ae5af2920b40d8fa9e0705058f57e2e4a8dac029af55514c9a20d5fad4fdd951d676dcaecd33795964dee3ff0a3a5d06
Static task
static1
Behavioral task
behavioral1
Sample
invoice-ID3626307348012.vbs
Resource
win7v20201028
Malware Config
Extracted
https://www.minpic.de/k/bfqj/2ipze/
Extracted
asyncrat
0.5.7B
saico015.linkpc.net:6666
AsyncMutex_6SI8OkPnk
-
aes_key
9FovObaHt9uwQBnog9MPOAzupINFTyW8
-
anti_detection
false
-
autorun
false
-
bdos
false
-
delay
Default
-
host
saico015.linkpc.net
-
hwid
3
- install_file
-
install_folder
%AppData%
-
mutex
AsyncMutex_6SI8OkPnk
-
pastebin_config
null
-
port
6666
-
version
0.5.7B
Targets
-
-
Target
invoice-ID3626307348012.vbs
-
Size
324B
-
MD5
50f7355426061a1952f878e61e072d5e
-
SHA1
90156383d18b6851298d1c68f0cca24f6c7375fe
-
SHA256
a412a3bdf6e8891fa60734b53430db5d0ac8dce28a764fd013dd767614790c45
-
SHA512
959e8b1cc6eb2e4cf8670567f60aa496ae5af2920b40d8fa9e0705058f57e2e4a8dac029af55514c9a20d5fad4fdd951d676dcaecd33795964dee3ff0a3a5d06
-
Async RAT payload
-
Blocklisted process makes network request
-