General
-
Target
Statment#5173642159.html
-
Size
1KB
-
Sample
240712-ra7zzsyeja
-
MD5
1231d299fcd9917fde1326f9ef677361
-
SHA1
f92479f63b0279c16e8499fe294e7b3d81da5942
-
SHA256
e296925add362ceb26927e02439ad56accc8ce03b14712fbd4dd41377be036aa
-
SHA512
0b76638bad3c2036c048b4b381a6192a14ed8770545d73ad8d49990ce30bd725b75fa721578e47cad8b946f63cc2e3681014acf72ba4af3598adba9e49345205
Static task
static1
Malware Config
Extracted
asyncrat
AWS | 3Losh
Elsa3eed
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/C7vDhgZQ
Targets
-
-
Target
Statment#5173642159.html
-
Size
1KB
-
MD5
1231d299fcd9917fde1326f9ef677361
-
SHA1
f92479f63b0279c16e8499fe294e7b3d81da5942
-
SHA256
e296925add362ceb26927e02439ad56accc8ce03b14712fbd4dd41377be036aa
-
SHA512
0b76638bad3c2036c048b4b381a6192a14ed8770545d73ad8d49990ce30bd725b75fa721578e47cad8b946f63cc2e3681014acf72ba4af3598adba9e49345205
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-