General
-
Target
2024-07-08_4428be5916f75751b9e52ac52f321820_megazord
-
Size
3.0MB
-
Sample
240709-aa52yswbkr
-
MD5
4428be5916f75751b9e52ac52f321820
-
SHA1
c5d11d22c71e770dd4f46f3f8142c6b140740738
-
SHA256
dc33f8af0fc9fadbc1c3af453db83f5a5088e4cb2439c8a3621c3648e37c6cb5
-
SHA512
75f2c59a5e2b3df5af85757c12e7ea697a9fd9505fc9dcd480b8210ac6db786d021aa7aca597b1f1aec2cd3cee1f14b336834fea12517235d0333f409b4914cb
-
SSDEEP
49152:/8yJAk206NICMq5pzKRgqVzKO0gFC5uamk6xB:ABsipAB
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-08_4428be5916f75751b9e52ac52f321820_megazord.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2024-07-08_4428be5916f75751b9e52ac52f321820_megazord.exe
Resource
win10v2004-20240704-en
Malware Config
Extracted
asyncrat
2.0.0
Default
webwhatsapp.cc:65503
ShiningForceRatMutex_cs_cs_cs
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2024-07-08_4428be5916f75751b9e52ac52f321820_megazord
-
Size
3.0MB
-
MD5
4428be5916f75751b9e52ac52f321820
-
SHA1
c5d11d22c71e770dd4f46f3f8142c6b140740738
-
SHA256
dc33f8af0fc9fadbc1c3af453db83f5a5088e4cb2439c8a3621c3648e37c6cb5
-
SHA512
75f2c59a5e2b3df5af85757c12e7ea697a9fd9505fc9dcd480b8210ac6db786d021aa7aca597b1f1aec2cd3cee1f14b336834fea12517235d0333f409b4914cb
-
SSDEEP
49152:/8yJAk206NICMq5pzKRgqVzKO0gFC5uamk6xB:ABsipAB
Score10/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-