General
-
Target
Alertas y Notificaciones.vbs
-
Size
2.6MB
-
Sample
240726-t7ee2szdqq
-
MD5
f85469b805e7ccd3da7f69df07566f0d
-
SHA1
e9d9b0ddda2aa1e0345b1a88a491f0ee43bdcdc0
-
SHA256
ef5fa3f193d8205806fc945aea79ea2aeddb8845d1d9e81e22e57370db09c426
-
SHA512
4bc1d37bce587cd3a2ba02bd0341f7a718e5b8b974b769a46c12fbb1ca8df4424955436c3ae40b06cfaa3b9ad2085ed712ca77e1df5e0e34fffcf244b05b121f
-
SSDEEP
1536:bPPPPPPPPP9PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP5:/f
Static task
static1
Malware Config
Extracted
https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll%2Fdll%20Hope.txt?alt=media&token=61c829f6-e196-49e8-b4ff-041134577ffe
Extracted
asyncrat
1.0.7
Default
envioagosto29.duckdns.org:2020
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Alertas y Notificaciones.vbs
-
Size
2.6MB
-
MD5
f85469b805e7ccd3da7f69df07566f0d
-
SHA1
e9d9b0ddda2aa1e0345b1a88a491f0ee43bdcdc0
-
SHA256
ef5fa3f193d8205806fc945aea79ea2aeddb8845d1d9e81e22e57370db09c426
-
SHA512
4bc1d37bce587cd3a2ba02bd0341f7a718e5b8b974b769a46c12fbb1ca8df4424955436c3ae40b06cfaa3b9ad2085ed712ca77e1df5e0e34fffcf244b05b121f
-
SSDEEP
1536:bPPPPPPPPP9PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP5:/f
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-