General
-
Target
[RUN] SPOOFER By aRI.bat
-
Size
764KB
-
Sample
230425-tg942adc3t
-
MD5
8f71fbed8a30478ab52ac1ff48286f14
-
SHA1
a841339481661a3dc0ef25cce420abffccb00ee4
-
SHA256
694a2daca65dfc59eb5883c12c8e592958c6b7206c4bb3d421efa3c826dce60d
-
SHA512
14e5b64f979a5b2dfac884be65012d0503c02585920797cef5495c5efa9bed2eba8d75acffe5681f9b4ec0c04946f132df552f273b5cb69cefa3a668d984fbc5
-
SSDEEP
384:Jt4t4tktLtGt4tUtYAt4toyDtOtTtZtUtet5tytetjtytbtytlt2yj:meyZyj
Static task
static1
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
potenzax999.linkpc.net:1177
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
[RUN] SPOOFER By aRI.bat
-
Size
764KB
-
MD5
8f71fbed8a30478ab52ac1ff48286f14
-
SHA1
a841339481661a3dc0ef25cce420abffccb00ee4
-
SHA256
694a2daca65dfc59eb5883c12c8e592958c6b7206c4bb3d421efa3c826dce60d
-
SHA512
14e5b64f979a5b2dfac884be65012d0503c02585920797cef5495c5efa9bed2eba8d75acffe5681f9b4ec0c04946f132df552f273b5cb69cefa3a668d984fbc5
-
SSDEEP
384:Jt4t4tktLtGt4tUtYAt4toyDtOtTtZtUtet5tytetjtytbtytlt2yj:meyZyj
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-