General
-
Target
node.ps1
-
Size
395KB
-
Sample
230920-sg67psba58
-
MD5
34acf6883ed4937fe14f798de56f4c9e
-
SHA1
f02f7e373fc35e30b62ebb05dd668a851d3c516f
-
SHA256
bce521d15424563d9a44e0712340cfc19eddac4d81c78375412ada2fc9c1e20c
-
SHA512
bbe7403dd81ef31d9259caf92cf7868d5d986ad9fd6c876c0420a62f04eb44abcbc2cc742ec5fd5633e94da0264c197043621f982e99eee646d6dd486b31b17c
-
SSDEEP
3072:ylL0042W5s89pKxiFymwjIG2OVjVvEaMZ:oLKy+
Static task
static1
Behavioral task
behavioral1
Sample
node.ps1
Resource
win7-20230831-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
BoshKash
wpe.mysynology.net:6606
wpe.mysynology.net:7707
wpe.mysynology.net:8808
AsyncMutex_BoshKash
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
node.ps1
-
Size
395KB
-
MD5
34acf6883ed4937fe14f798de56f4c9e
-
SHA1
f02f7e373fc35e30b62ebb05dd668a851d3c516f
-
SHA256
bce521d15424563d9a44e0712340cfc19eddac4d81c78375412ada2fc9c1e20c
-
SHA512
bbe7403dd81ef31d9259caf92cf7868d5d986ad9fd6c876c0420a62f04eb44abcbc2cc742ec5fd5633e94da0264c197043621f982e99eee646d6dd486b31b17c
-
SSDEEP
3072:ylL0042W5s89pKxiFymwjIG2OVjVvEaMZ:oLKy+
-
Async RAT payload
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-