General
-
Target
windows.vbs
-
Size
897KB
-
Sample
240523-t2j4cahb7s
-
MD5
5964d98cf06acef50055252add1acc74
-
SHA1
4fc5206d256394d7e6c9b3fb648bad6e0f714058
-
SHA256
ca073831a8671f0d5cc9f0149c43b58be3d92b4a7b5a39235b1547acd2e5de28
-
SHA512
9477633a7073c2753c1df75b6321d8d1b43158c83607e5f0fab69463fb67602eaae708b0c27c0087185cd46c90f9024ac4ded03a38cf91c8154cc771c9a3d29a
-
SSDEEP
12288:qzTzUyR7hSRac+qkLmttaGgMskgqoiMHsp9NH:UXh+k+taGKqoJONH
Static task
static1
Behavioral task
behavioral1
Sample
windows.vbs
Resource
win7-20240215-en
Malware Config
Extracted
asyncrat
0.5.7B
Default
dhhj.duckdns.org:8797
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
windows.vbs
-
Size
897KB
-
MD5
5964d98cf06acef50055252add1acc74
-
SHA1
4fc5206d256394d7e6c9b3fb648bad6e0f714058
-
SHA256
ca073831a8671f0d5cc9f0149c43b58be3d92b4a7b5a39235b1547acd2e5de28
-
SHA512
9477633a7073c2753c1df75b6321d8d1b43158c83607e5f0fab69463fb67602eaae708b0c27c0087185cd46c90f9024ac4ded03a38cf91c8154cc771c9a3d29a
-
SSDEEP
12288:qzTzUyR7hSRac+qkLmttaGgMskgqoiMHsp9NH:UXh+k+taGKqoJONH
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-