General
-
Target
Bloody_Loader.bat
-
Size
272KB
-
Sample
240814-xat11ssejm
-
MD5
7c0a3650dec50cf6ebebccbeefde89fc
-
SHA1
066764d975297ccb6a4ad915e9f3a4757f739362
-
SHA256
eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453
-
SHA512
ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635
-
SSDEEP
6144:K4X36tiZ6MmwN5aQgSOzGhjWEop+/k1f+JcXB:9KwZQmcQgSO6hjFopwkp7
Static task
static1
Malware Config
Extracted
asyncrat
1.0.7
Slave
0.tcp.ngrok.io:19607
DcRatMutex_UIHUIHUIGUvytyfIfUDytYTdyyDytdtyducyCw
-
delay
1
-
install
true
-
install_file
guiGUIgYFyufiuyIgogILGoW.exe
-
install_folder
%AppData%
Targets
-
-
Target
Bloody_Loader.bat
-
Size
272KB
-
MD5
7c0a3650dec50cf6ebebccbeefde89fc
-
SHA1
066764d975297ccb6a4ad915e9f3a4757f739362
-
SHA256
eb94ad681ca2acc14bd598c0fcefbc4c059e2de8f1ff2a93401bfdc56fbfb453
-
SHA512
ec1656af327a5df43ef4765cc1221411ae5f402809b165b741ea4749110825f5724dfa0611286cc8f2ac401b9f9cb440dbdf359f826d3cbddbded987a5586635
-
SSDEEP
6144:K4X36tiZ6MmwN5aQgSOzGhjWEop+/k1f+JcXB:9KwZQmcQgSO6hjFopwkp7
-
Async RAT payload
-