General
-
Target
https://drive.usercontent.google.com/u/0/uc?id=1Mjh9mHfA5x0H2pdzGNsS9s7iaLG1FeY9&export=download
-
Sample
240723-2f7lhswanc
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.usercontent.google.com/u/0/uc?id=1Mjh9mHfA5x0H2pdzGNsS9s7iaLG1FeY9&export=download
Resource
win10v2004-20240704-en
windows10-2004-x64
22 signatures
300 seconds
Malware Config
Extracted
Family
asyncrat
Version
Xchallenger | 3Losh
Botnet
SSSV2xfPymSGyZKXNnD
C2
anothonesevenfivesecsned.ddns.net:6666
Mutex
AsyncMutex_TmizKoi8nsHRdZoA
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://drive.usercontent.google.com/u/0/uc?id=1Mjh9mHfA5x0H2pdzGNsS9s7iaLG1FeY9&export=download
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-