General
-
Target
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7_JC.exe
-
Size
220KB
-
Sample
231010-weg2ksfb8x
-
MD5
0e0b669d90c80cea6398e81d139d7d29
-
SHA1
fc8014c4c916af6556e677402dfe8ebfd55cd9ef
-
SHA256
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7
-
SHA512
a0ba75bf203b1f69040eff26c43b372f7fd995b214edd0e7814f969a88fcd96646a22251d92cf752dbd57e1e2521b9bfb6f2921cce90a429fc22651919b2175b
-
SSDEEP
3072:H3grKG6eriEss8/8qJqXuN/QR+InqJ0m1fVMaeLnpvAsWtV9Jp:XgfricQ8qJqXuN/QUInxYfaeftV
Static task
static1
Behavioral task
behavioral1
Sample
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7_JC.exe
Resource
win10v2004-20230915-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
RAZ-EXE
amm.mine.nu:1335
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7_JC.exe
-
Size
220KB
-
MD5
0e0b669d90c80cea6398e81d139d7d29
-
SHA1
fc8014c4c916af6556e677402dfe8ebfd55cd9ef
-
SHA256
80f3aa803d69a8a11cd9d625340f9cf1e759c2c23cfab97752c8ac76e74fdfb7
-
SHA512
a0ba75bf203b1f69040eff26c43b372f7fd995b214edd0e7814f969a88fcd96646a22251d92cf752dbd57e1e2521b9bfb6f2921cce90a429fc22651919b2175b
-
SSDEEP
3072:H3grKG6eriEss8/8qJqXuN/QR+InqJ0m1fVMaeLnpvAsWtV9Jp:XgfricQ8qJqXuN/QUInxYfaeftV
Score10/10-
Async RAT payload
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-