General
-
Target
Leakcloud.fun_Link_Skipper.zip
-
Size
3.7MB
-
Sample
240611-w245mawfqe
-
MD5
139b57ad667d4e50c91b09f5c98a5517
-
SHA1
23ba0adcf907d49fdf060a3729995fe67cdc4b94
-
SHA256
acc9169e89e48e648199c06809072a6802b3a49300721b885228c669b9777240
-
SHA512
47798fd026eb4256b7021a53c938a511f6d8608021ed90df5e9eac80f42bb36c2167f52d81c9b54f4c91cd596b364e881b702712740051abd5e5c13a8d98f447
-
SSDEEP
49152:uwPnmfJ4BaqTVtJf9DzZQCc9AbJucD3PAxGf6Sfl5y5FRW1JSY1CJ7t6+dK7DCMz:JvAebt9fOGfDlsJx6aGDQD+PXHwK
Static task
static1
Behavioral task
behavioral1
Sample
Leakcloud.fun_Link_Skipper.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Leakcloud.fun_Link_Skipper.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Ionic.Zip.Reduced.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Ionic.Zip.Reduced.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
asyncrat
true
Link Skipper B
RRAT_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
powershell Add-MpPreference -ExclusionPath C:\
-
install_folder
Explorer.exe
-
pastebin_config
http://pastebin.com/raw/KKpnJShN
Targets
-
-
Target
Leakcloud.fun_Link_Skipper.zip
-
Size
3.7MB
-
MD5
139b57ad667d4e50c91b09f5c98a5517
-
SHA1
23ba0adcf907d49fdf060a3729995fe67cdc4b94
-
SHA256
acc9169e89e48e648199c06809072a6802b3a49300721b885228c669b9777240
-
SHA512
47798fd026eb4256b7021a53c938a511f6d8608021ed90df5e9eac80f42bb36c2167f52d81c9b54f4c91cd596b364e881b702712740051abd5e5c13a8d98f447
-
SSDEEP
49152:uwPnmfJ4BaqTVtJf9DzZQCc9AbJucD3PAxGf6Sfl5y5FRW1JSY1CJ7t6+dK7DCMz:JvAebt9fOGfDlsJx6aGDQD+PXHwK
Score1/10 -
-
-
Target
Ionic.Zip.Reduced.dll
-
Size
247KB
-
MD5
7c359500407dd393a276010ab778d5af
-
SHA1
4d63d669b73acaca3fc62ec263589acaaea91c0b
-
SHA256
a4009288982e4c30d22b544167f72db882e34f0fda7d4061b2c02c84688c0ed1
-
SHA512
88a25138d0a491e5ee27499206e05b8c501da0c73ad2b3e23d70e810a09bfc1b701817de7f22c9f0b9f81f90235fe5eeadd112773035a11f01706eac364b34bc
-
SSDEEP
3072:nrI52ReHNdAFnfPPShREuMPb9YlVVRxpop2i0KKCXrXSbS4KcMy8ZZL5QlcSCSLw:yNdA+Myl7TpNiWCL4EycZb4
Score1/10 -
-
-
Target
[Leakcloud.fun] Link Skipper.exe
-
Size
523.0MB
-
MD5
b928c8e9fbdea0d3d904df7a09955640
-
SHA1
3caec7a61590a0287d2c350da8439cf977f3ab7a
-
SHA256
1f1407140a7a550335d170429646438cef0d37ec51a6378ac08c132e9e7d8420
-
SHA512
7627815855b32eec15e358246f2764b517790afb7bdac6ada17ec3184c96397248f1ce1150d3efe54f779f0e290bb2d03b6124a6c6df2dd2c7cfadc0138a627a
-
SSDEEP
49152:XJED040Mm05vldXLyY4huQNuZo+rGlYnqRK7xPNH6Yjs1hm0zydRtmSH07JS44iE:XCX5soNvqRK7dqSdzmy4JMdaP67
Score10/10-
Async RAT payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-