General
-
Target
Quarantined Messages (1).zip
-
Size
644KB
-
Sample
240726-qp4enszhjm
-
MD5
264a47dd7ef0c91fc72d036d4f29852c
-
SHA1
4e889a2642e4aa21ba5e0c732f1a41dae8e1a257
-
SHA256
20ef76c154dc7e7ebb7a1dc49590fab234f0f082133ed085bd834f89bd16c66b
-
SHA512
cd56f2e64589197a26a30862f7cc94ae00cecaf122348864b31299710ecd902266183af1db7618b64fe3711a73861594f4e3394d4dd9754763dc9dfb5f91495f
-
SSDEEP
12288:KX9OaxSIF8UI8DzWS6HAu+VRCrGSiPnL5q+9UGVFFMq8oogM1e14CEVAsGd:reIKbCrGSiPnQOFFMqZMUKCEfGd
Static task
static1
Behavioral task
behavioral1
Sample
'.exe
Resource
win11-20240709-en
Behavioral task
behavioral2
Sample
Mia_Malkova_Photos.vbs
Resource
win11-20240709-en
Malware Config
Extracted
asyncrat
1.0.7
GB
141.95.84.40:3080
XXXXXX
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
'
-
Size
927KB
-
MD5
1acefd52b10b834de4e770df29a8e8b9
-
SHA1
adace06de40d3a81e92e5e5368d0a6854d785115
-
SHA256
acaa5403a8c73414495693520d7e94c423abc4ae4237eddad8cb0886e6b23724
-
SHA512
f8206d24e3f370caefe81cea4212581afe33af8867f2647754b5a67b5f69dc472bb4c892d6b048b72685844b8b4865b1f118ceffebb4571146547997d3f9731a
-
SSDEEP
12288:ltgnPhEgPMI+c45linVLYeXP54o3Mn53XBVF+2O/6yCbfLVZIfTbowek5+n5A7y7:EP6gPvh45liV0ey6MnFXk2O/wfIrbGKe
Score1/10 -
-
-
Target
Mia_Malkova_Photos.vbs
-
Size
4.0MB
-
MD5
83959ea07eae4d7f08fb11862ed707cb
-
SHA1
80f40a35bde7a1500476bb17401948f4f811c7b0
-
SHA256
20f8f27cdfbd0a0346a2e43348b3ae626d3aa4712ab559dce8286b74a58ddeb8
-
SHA512
16faa156267bd072d9c889c951a109c827cc61d01b5962a74c912a8a63d5582802a6d1cb78875294ee3cb1fe361cfc41545837c22a4f76765f74e9b609942d05
-
SSDEEP
12288:X999t9t9t9t9t99999999999t99t99999999tttt9tt9t9t99t99tt9t9t9ttttE:EGg
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-