General
-
Target
74612d59e628594289ac484c3dd2f533313bbcf40f751645b4fcbd52b381e80f
-
Size
25KB
-
Sample
240419-t2k1mshc32
-
MD5
71f7c0f32c43a2595a2a7f73c38b5e8c
-
SHA1
081b0c0122fc8a8d1497b9568a3852fbe56b9414
-
SHA256
74612d59e628594289ac484c3dd2f533313bbcf40f751645b4fcbd52b381e80f
-
SHA512
f7ff475bfc10c20fc845928e2207565d0d2a6ae8af63341c966ce99a5046b828af4c4fbffefac0c57b4bfc7c4c00e9f5abb6bba3c7105bbce874fb70fd070464
-
SSDEEP
384:pm/zpUNiH4EWwQjFWqHRbOxKVH8YjjhCtFlI80WcB2qf8fFKGMdhOWZfYIdPB4:pEugbIYKRbbZRCblI8pW8ffQm0+
Static task
static1
Behavioral task
behavioral1
Sample
b3b1a41903116bbc9fedd6403c9ad1976eefdcd50c322859f993a822b3bbac08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b3b1a41903116bbc9fedd6403c9ad1976eefdcd50c322859f993a822b3bbac08.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
Exodus_Market
leetboy.dynuddns.net:1339
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
svchos.exe
-
install_folder
%AppData%
Extracted
asyncrat
5.0.5
WDKILLER
blue.o7lab.me:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
b3b1a41903116bbc9fedd6403c9ad1976eefdcd50c322859f993a822b3bbac08.exe
-
Size
50KB
-
MD5
1f2ec9232f191e28fa8d5fbcbfad3a4f
-
SHA1
ee22f5b25185c5a6d37e16d3eb52f9515fd6964d
-
SHA256
b3b1a41903116bbc9fedd6403c9ad1976eefdcd50c322859f993a822b3bbac08
-
SHA512
af552abac7d370508b699a19c757342a7a70e897d3d5321d5c7933c815f0880bad9e4c20cd22002643b67f4dc220d1e3e5d69ffd0b91792d6ab5a777e42ec8a8
-
SSDEEP
1536:Idzg+bioFSXbzMncp4t9vUEUL4NQ6lD1UPko94yQ1Jzra4o35PGCwWCDGD3fNmHz:2mkcpumcvQaB/EINnZD6nLsow
-
Async RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-