General
-
Target
6624460ca71e7d0c2e6ae2962edfe4fe
-
Size
1KB
-
Sample
240118-1xe26aahd5
-
MD5
6624460ca71e7d0c2e6ae2962edfe4fe
-
SHA1
850493b0c22f02ed2d0b303069a12ae351233921
-
SHA256
f12528b99799f2145cbf4938cf131c5ee1f24151b114bafea704e28c2cd53116
-
SHA512
4b2a03169e6a4f49123a9aa429be0833a5d065578331f27bd32f3bcf1a5cc83c2b2641cc9f8c96b4c6fb57374ba3eb2a456a83c9daf15f9d89c8044f323d6e22
Static task
static1
Behavioral task
behavioral1
Sample
6624460ca71e7d0c2e6ae2962edfe4fe.ps1
Resource
win7-20231129-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
dllhost.xyz:6606
dllhost.xyz:7707
dllhost.xyz:8808
dllhost.xyz:21000
dllhost.xyz:20000
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
6624460ca71e7d0c2e6ae2962edfe4fe
-
Size
1KB
-
MD5
6624460ca71e7d0c2e6ae2962edfe4fe
-
SHA1
850493b0c22f02ed2d0b303069a12ae351233921
-
SHA256
f12528b99799f2145cbf4938cf131c5ee1f24151b114bafea704e28c2cd53116
-
SHA512
4b2a03169e6a4f49123a9aa429be0833a5d065578331f27bd32f3bcf1a5cc83c2b2641cc9f8c96b4c6fb57374ba3eb2a456a83c9daf15f9d89c8044f323d6e22
-
Async RAT payload
-
Blocklisted process makes network request
-