General
-
Target
Leer Documento.vbs
-
Size
29.8MB
-
Sample
240805-z8n9jaserd
-
MD5
8f6a366451534b6a116ead97875cda64
-
SHA1
207b773f42783fd28b4642c6cb670898ab1030c9
-
SHA256
b6e8bd4b566117771b4eccdaf9f1ce0a7622a7d201d54db1876dd6d268e4b76b
-
SHA512
020c48540dbe78abee20da7e45997271d018b3f2d3463563d6d363b3e703cc8488a29c8fd90c0da57c0c158639786f35817f73d0c3437f5357d304e73fef2e8d
-
SSDEEP
1536:XPN+PFP4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPR:ld
Static task
static1
Behavioral task
behavioral1
Sample
Leer Documento.vbs
Resource
win7-20240705-en
Malware Config
Extracted
https://firebasestorage.googleapis.com/v0/b/rodriakd-8413d.appspot.com/o/dll%2Fdll%20Hope.txt?alt=media&token=61c829f6-e196-49e8-b4ff-041134577ffe
Extracted
asyncrat
1.0.7
Default
envi2024agosto.duckdns.org:2020
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Leer Documento.vbs
-
Size
29.8MB
-
MD5
8f6a366451534b6a116ead97875cda64
-
SHA1
207b773f42783fd28b4642c6cb670898ab1030c9
-
SHA256
b6e8bd4b566117771b4eccdaf9f1ce0a7622a7d201d54db1876dd6d268e4b76b
-
SHA512
020c48540dbe78abee20da7e45997271d018b3f2d3463563d6d363b3e703cc8488a29c8fd90c0da57c0c158639786f35817f73d0c3437f5357d304e73fef2e8d
-
SSDEEP
1536:XPN+PFP4PPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPR:ld
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-