General
-
Target
f.txt
-
Size
346B
-
Sample
230606-w3j6vafe7z
-
MD5
41e54b45d2ab4718156a2d978aeb2eaa
-
SHA1
b8f924f1fd50d3feba999029615ae6d2b47ecea7
-
SHA256
eac03f7bc83d42d686c55a12736a74086e1feada3ef4181f79c5435311a5358d
-
SHA512
96a51af6ebb69dc01971fef39a5e033417a02299080804a7062182f64be5b9c5ce0ac863397e34bfeca5a1b1c767883a4b6b3888e36e8f443ac0f1bb661e7727
Static task
static1
Behavioral task
behavioral1
Sample
f.vbs
Resource
win7-20230220-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Default
195.178.120.137:4001
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
f.txt
-
Size
346B
-
MD5
41e54b45d2ab4718156a2d978aeb2eaa
-
SHA1
b8f924f1fd50d3feba999029615ae6d2b47ecea7
-
SHA256
eac03f7bc83d42d686c55a12736a74086e1feada3ef4181f79c5435311a5358d
-
SHA512
96a51af6ebb69dc01971fef39a5e033417a02299080804a7062182f64be5b9c5ce0ac863397e34bfeca5a1b1c767883a4b6b3888e36e8f443ac0f1bb661e7727
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-