General
-
Target
file01.ps1
-
Size
699KB
-
Sample
240517-ca144sbh91
-
MD5
5bafcc545166ee343b7c203a149429f0
-
SHA1
2369df6b797715df19083b3ee2d52b0ae164fd77
-
SHA256
ab6c409a1342807f44c736a608856d57c242bde28be16ab6c0be7dfa188b65e7
-
SHA512
8dcd7f9c26768192f0fb5d10f6b296d5659f0fac72ee711428758b541c280f4b0f27acc03c91bf289af2a652ea69acfcb95774a7f889542380c65eb6c2a26fe1
-
SSDEEP
12288:V+x48PQ0D1VF5sh0cxA3QvR979qkmVeeAV08mfMtfB7F:V848PQ0D1b53cxAgF
Static task
static1
Behavioral task
behavioral1
Sample
file01.ps1
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file01.ps1
Resource
win10v2004-20240508-en
Malware Config
Extracted
asyncrat
| Cracked by Mekho RAT
New Resulit
servicem.mywire.org:555
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
file01.ps1
-
Size
699KB
-
MD5
5bafcc545166ee343b7c203a149429f0
-
SHA1
2369df6b797715df19083b3ee2d52b0ae164fd77
-
SHA256
ab6c409a1342807f44c736a608856d57c242bde28be16ab6c0be7dfa188b65e7
-
SHA512
8dcd7f9c26768192f0fb5d10f6b296d5659f0fac72ee711428758b541c280f4b0f27acc03c91bf289af2a652ea69acfcb95774a7f889542380c65eb6c2a26fe1
-
SSDEEP
12288:V+x48PQ0D1VF5sh0cxA3QvR979qkmVeeAV08mfMtfB7F:V848PQ0D1b53cxAgF
Score10/10-
Suspicious use of SetThreadContext
-