General
-
Target
Report Details.vbs
-
Size
57KB
-
Sample
220415-cefc7sbff3
-
MD5
52d94e55aac61768976f39040c288eef
-
SHA1
e942fa64351f106b614b28e86d3a42d50e5a0443
-
SHA256
fcd18b069a963b01f447b35ac7f12421ac36f8c577a1f19880ea0258e0505747
-
SHA512
fe278c9483992b979e356ec4380182d7519d47144cf3ed9c9caaf0346c4bcb788272562f57264ac7a3a35bf67e9e36ac19ec5d5a07d9564a99360de77b72b717
Static task
static1
Behavioral task
behavioral1
Sample
Report Details.vbs
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Report Details.vbs
Resource
win10v2004-20220414-en
Malware Config
Extracted
https://textbin.net/raw/x6lfwhnyrz
Extracted
asyncrat
1.0.7
Default
crazydns.linkpc.net:5900
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Report Details.vbs
-
Size
57KB
-
MD5
52d94e55aac61768976f39040c288eef
-
SHA1
e942fa64351f106b614b28e86d3a42d50e5a0443
-
SHA256
fcd18b069a963b01f447b35ac7f12421ac36f8c577a1f19880ea0258e0505747
-
SHA512
fe278c9483992b979e356ec4380182d7519d47144cf3ed9c9caaf0346c4bcb788272562f57264ac7a3a35bf67e9e36ac19ec5d5a07d9564a99360de77b72b717
Score10/10-
Meta Stealer Stealer
Meta Stealer steals passwords stored in browsers, written in C++.
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-