General
-
Target
1547744O.VBS
-
Size
2KB
-
Sample
220428-z7aprafee7
-
MD5
1c710652be2571bdff62812e8105eadf
-
SHA1
8c6fede5ef62aa987050891d380eb66c62b23434
-
SHA256
b8d6861bb63f0e06525c4d45e79e6c116c49267877174cb987a139260dec81e3
-
SHA512
b807da2d08caf07766214e08668a40595f1ee67a9f2ebea762e6bb24f12ce55b0f97b704139ed6ed36f0deb88efb142324d687cd74c4c70728c8df2b43cd14f2
Static task
static1
Behavioral task
behavioral1
Sample
1547744O.vbs
Resource
win7-20220414-en
Malware Config
Extracted
asyncrat
0.5.7B
2
anderione.com:5253
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
1547744O.VBS
-
Size
2KB
-
MD5
1c710652be2571bdff62812e8105eadf
-
SHA1
8c6fede5ef62aa987050891d380eb66c62b23434
-
SHA256
b8d6861bb63f0e06525c4d45e79e6c116c49267877174cb987a139260dec81e3
-
SHA512
b807da2d08caf07766214e08668a40595f1ee67a9f2ebea762e6bb24f12ce55b0f97b704139ed6ed36f0deb88efb142324d687cd74c4c70728c8df2b43cd14f2
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
suricata: ET MALWARE Generic AsyncRAT Style SSL Cert
-
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-