General
-
Target
[2] Asteroid 24.4.5.zip
-
Size
4.1MB
-
Sample
240526-vvfm1sef34
-
MD5
a3c2ea4dac3842fb00f4e96c68c973e9
-
SHA1
1e8c94d2a4060e9dda3963f9496500a18f000435
-
SHA256
49bc0bf3759bac6322ad584c9cc87f41bb17820dede17a78724283aa40742d87
-
SHA512
0b3341cf3a00d8b9a164474b8b60c3956eac96fa2c8377dbbadf0afe25dd2d227317dbb2b16ffd9a36ba32d212a30d0e1eadd5a4925cf0b89bd89dfd852ed321
-
SSDEEP
98304:z6K6wTN/D6uhH+qJ/11yiH6Tf710pNLwbYD2FTDgTCVtreRUczMcCI/g6:zwGRDFV+I/1h4710pNLwb9nVtr3cCQ
Static task
static1
Behavioral task
behavioral1
Sample
AsteroidPC.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
AsteroidPC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Injectors/processhacker-2.39-setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Injectors/processhacker-2.39-setup.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
AsteroidPC.dll
-
Size
5.2MB
-
MD5
1892a8ba09e7d8b57e4475712678c5b9
-
SHA1
322e257374b4b14651437dd917196b0a2af5457c
-
SHA256
0c0ed1f047e71deb540b338ff50e548a4992e27f0a4508a63f72bb68cb2efaa1
-
SHA512
46a4020369ac9304ff40569afed53c9a560d4f47f654408c55f8af942ef8e27d07234f083d600db66ac81c792baffe6df1e5bacf2b746340139e2e30a26f1b82
-
SSDEEP
98304:G/+ORjEgPeQaSntN8oeXmO/qN9nVSarrPABDAwq1FbL:sNRggPeQaSntNBmmO/qTnkarrPABDAwc
Score8/10-
Blocklisted process makes network request
-
-
-
Target
Injectors/processhacker-2.39-setup.exe
-
Size
2.2MB
-
MD5
54daad58cce5003bee58b28a4f465f49
-
SHA1
162b08b0b11827cc024e6b2eed5887ec86339baa
-
SHA256
28042dd4a92a0033b8f1d419b9e989c5b8e32d1d2d881f5c8251d58ce35b9063
-
SHA512
8330de722c8800ff64c6b9ea16a4ff7416915cd883e128650c47e5cb446dd3aaa2a9ba5c4ecda781d243be7fb437b054bbcf942ea714479e6cc3cef932390829
-
SSDEEP
49152:l9hfV/U5NkLXXzGZjt6kFTCVP6hWE0wvmk/eE+FrAl+NGsOSE6IX8pq:Dh9/ULkjKxtTGP6VZd2rAcvOSE6Nq
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-