General
-
Target
New folder.zip
-
Size
250KB
-
Sample
240708-jrnzfa1hmh
-
MD5
862596f4db8efd0d6d1bae204ade81f5
-
SHA1
272576dcc59964db391cae4247cf44ba45c6f06f
-
SHA256
6bce3efc034465072079041148dcd6bdff611d1bd7dfbc4c61161faf47c3d066
-
SHA512
695ebad239b023ee2bea080e225c351f504238e66327007802e40b7e0ed12cde15c4a3ad07d6ac15bd2ca8ca741882e4fbd43bb659099970b9daa15f73a716b1
-
SSDEEP
6144:ECs9Ogq89cjxtez+i4nDxbqAR9zzmYARtf+kVKvTatstTC:Er9Om6jHntnDxbTRFnMf+kVKvTqstTC
Behavioral task
behavioral1
Sample
New folder.zip
Resource
win10v2004-20240704-en
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:8808
QdNftpHJFSw4
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
New folder.zip
-
Size
250KB
-
MD5
862596f4db8efd0d6d1bae204ade81f5
-
SHA1
272576dcc59964db391cae4247cf44ba45c6f06f
-
SHA256
6bce3efc034465072079041148dcd6bdff611d1bd7dfbc4c61161faf47c3d066
-
SHA512
695ebad239b023ee2bea080e225c351f504238e66327007802e40b7e0ed12cde15c4a3ad07d6ac15bd2ca8ca741882e4fbd43bb659099970b9daa15f73a716b1
-
SSDEEP
6144:ECs9Ogq89cjxtez+i4nDxbqAR9zzmYARtf+kVKvTatstTC:Er9Om6jHntnDxbTRFnMf+kVKvTqstTC
Score10/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-