General
-
Target
file.bat
-
Size
226B
-
Sample
231113-v9lgtaec41
-
MD5
b34b91cd445ac63caa329c1ae21fc024
-
SHA1
5fae83ff22c9c5f8e681a69d9c7f405dbfeffb94
-
SHA256
c0ecdb5046ff0c85592a794cb42f8acc7d1814892a890f07f4e1a9f3e0e0b2df
-
SHA512
3ec3570670e00580ccb2e188a08cd4d580bef8315fd3063bfff605a9c84a6d32dbac28f5bc70489f008e36b3a41f281e1a7777ca5493186f8e9e9f7e0e7739e6
Static task
static1
Malware Config
Extracted
http://91.92.242.28:222/jn.jpg
Extracted
asyncrat
| Edit 3LOSH RAT
Default
win009.theworkpc.com:5010
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
file.bat
-
Size
226B
-
MD5
b34b91cd445ac63caa329c1ae21fc024
-
SHA1
5fae83ff22c9c5f8e681a69d9c7f405dbfeffb94
-
SHA256
c0ecdb5046ff0c85592a794cb42f8acc7d1814892a890f07f4e1a9f3e0e0b2df
-
SHA512
3ec3570670e00580ccb2e188a08cd4d580bef8315fd3063bfff605a9c84a6d32dbac28f5bc70489f008e36b3a41f281e1a7777ca5493186f8e9e9f7e0e7739e6
-
Detect ZGRat V1
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-