General
-
Target
svchost.exe
-
Size
63KB
-
Sample
240731-sk1jbsvalf
-
MD5
6fcae16ecca8f23f2195303c254bf3b7
-
SHA1
09c01f22621ae484af43d6646d1aa0141cdc75be
-
SHA256
e3ed12c6ddd0437e670d1524b39e33fa67f262de1195b9833d353151a86498b9
-
SHA512
1f27a1ae0b14485b35f25c1bf81e098246be4ed007ec3275a9277bb795e12ed56a0755d3b7c4a1fff973a24561d71b7157e78d4be489f90b47262b4303caabbc
-
SSDEEP
1536:RhMpLbRQkB4+ENdZceiHFGbbXwLtok9GIkpqKmY7:RhMpLbRQkB4tdOeoGbbXc2kNvz
Malware Config
Extracted
asyncrat
1.2
Default
stores-less.gl.at.ply.gg:45080
AtomRatMutex_penka
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%AppData%
Targets
-
-
Target
svchost.exe
-
Size
63KB
-
MD5
6fcae16ecca8f23f2195303c254bf3b7
-
SHA1
09c01f22621ae484af43d6646d1aa0141cdc75be
-
SHA256
e3ed12c6ddd0437e670d1524b39e33fa67f262de1195b9833d353151a86498b9
-
SHA512
1f27a1ae0b14485b35f25c1bf81e098246be4ed007ec3275a9277bb795e12ed56a0755d3b7c4a1fff973a24561d71b7157e78d4be489f90b47262b4303caabbc
-
SSDEEP
1536:RhMpLbRQkB4+ENdZceiHFGbbXwLtok9GIkpqKmY7:RhMpLbRQkB4tdOeoGbbXc2kNvz
-
Async RAT payload
-
Executes dropped EXE
-