General
-
Target
621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.zip
-
Size
1KB
-
Sample
230321-rvqlfaah89
-
MD5
395fe6a77d407033a4fa4b2a2db04bcb
-
SHA1
5d83226068de6f9a1975cd8e0207dbc8a7225701
-
SHA256
5118a2474186a2b702e3daa0315501eb400aa40594a7444133abe9edee6f94e1
-
SHA512
c735c3d346ad6b67850c58b0fab7a47cda7c7b84e09a15f05afb796be063ee77466a57cf88ae3925e8c1fd7c108ab47d821df7231f565efea9f8c74a3fe89e0c
Static task
static1
Behavioral task
behavioral1
Sample
621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.js
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.js
Resource
win10v2004-20230220-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
New Grapity
services.work.gd:555
AsyncMutex
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67.js
-
Size
37KB
-
MD5
69217e37a891c3aa3c9ccb9d115ef51d
-
SHA1
9d16ee0f7e6af6fc2f6bf5b1a4871d7f74eefac5
-
SHA256
621192a2ddec59e4abc0239e7d091535acfc98ceb60fd38069fae06af9af8d67
-
SHA512
ce539eff77c75075202ec16ae952b27edc51fbb3b37f152c6b15552b207ac0f7b0db28eed2f038e5b8791b25d2151316d9aca8a6e496b5b780a169f93fd8e360
-
SSDEEP
384:XIIIIIIIIIIIeIIIIIIIIIII2GIIIIIIIIIIIlIIIIIIIIIII6eYIIIIIIIIIIIj:pTi+i
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Registers COM server for autorun
-
Suspicious use of SetThreadContext
-