General
-
Target
MALICIOUS.wsf
-
Size
268KB
-
Sample
240509-jwpfrsbb83
-
MD5
025d83a734e8c6662150026387094018
-
SHA1
414f633540752761c2d662c276870b2cd9504977
-
SHA256
c556f4ab2685326454234db7e67adfe7d78ce298deebe354a32c4091ea4eace1
-
SHA512
c7ccc002fa81928eb0e6affdc4baef9dc090301a18d09ac1fe4cf7401d7fdcd826d2d34107794b821c273c12de8da827fef3316e14508928756bc9e89b197e0e
-
SSDEEP
3072:1lelelelelelAlelelelelel7lelelelelelnlElelelelelelElelelelelelAX:6
Static task
static1
Behavioral task
behavioral1
Sample
MALICIOUS.wsf
Resource
win7-20240419-en
Malware Config
Extracted
http://world1.webredirect.org:770/1001.jpg
Extracted
asyncrat
AWS | 3Losh
PORT=1001
world1.webredirect.org:1001
AsyncMutex_a1001
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
MALICIOUS.wsf
-
Size
268KB
-
MD5
025d83a734e8c6662150026387094018
-
SHA1
414f633540752761c2d662c276870b2cd9504977
-
SHA256
c556f4ab2685326454234db7e67adfe7d78ce298deebe354a32c4091ea4eace1
-
SHA512
c7ccc002fa81928eb0e6affdc4baef9dc090301a18d09ac1fe4cf7401d7fdcd826d2d34107794b821c273c12de8da827fef3316e14508928756bc9e89b197e0e
-
SSDEEP
3072:1lelelelelelAlelelelelel7lelelelelelnlElelelelelelElelelelelelAX:6
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-