General
-
Target
unifyworld.bat
-
Size
82KB
-
Sample
221008-j7zqwaeegp
-
MD5
78f209baa76e9331b563a3aabb439732
-
SHA1
94a9fa43bf4fed618cbc707f7a6d9d0860ad6077
-
SHA256
dec300bc7f59fa5250a44f3300797ec2b2e72006be9a63f567477e95b776f9dc
-
SHA512
fa41c6b70e2aeb6b5a175d8a01bf17519c204bb51c4124a2bcaabc561039c65a24682c94a1330b6c7f67964de662449335dc99735ccc831642e60c77deaf267f
-
SSDEEP
192:wR7KNVqYFQqwxqYgQFYNpdiohUPOzfXwQ9:+QVqYFQqwxqYgQFYNpdioQObXwQ
Static task
static1
Behavioral task
behavioral1
Sample
OutPut2.bat
Resource
win7-20220812-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
andojan.ddns.net:6606
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
OutPut2.bat
-
Size
21KB
-
MD5
c32b1f1bb8eda7a1e148c1cdf014f23b
-
SHA1
af0cc28285fc57632751f970ba3040bb1af2faa0
-
SHA256
8a0dc53293a9c974b1884f315f724024713523a6cc95e5bb4abee5fdaf79a9b6
-
SHA512
f7d04d94d7dbabcf7aff4493745660efd65321c2d3e1c2a5c2fea4d02ecbcf90d77e322ef13d257ae263aadbd4cab6a4f237b349b8be0e3e30e3e31f6732980e
-
SSDEEP
96:VMzFOMzFJMzFLMzFeMzFzMzFJMzFTMzFiMzFJMzFLMzFUHQeMzFLMzF2MzFqMzFN:OVqYFQqwxqYgQFYNpdiohUPOzfXwQ9j
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-