General
-
Target
2024-08-16_8011acea0e5030f608593fb802e517db_avoslocker_hijackloader_rhadamanthys
-
Size
3.2MB
-
Sample
240816-a551favhlh
-
MD5
8011acea0e5030f608593fb802e517db
-
SHA1
8c1c5aa5194d74f8cc1424a25512f45ee8404725
-
SHA256
0a2ed20b002c7738de9b99d5c47d51d473109f0b83a404675559acd9a74f2d0b
-
SHA512
dae41758d3329adbcf3ef9788dd84c2bba1b6535da99933f21c9fcf68cad276f0481466f87810614c3b9493b4007a52a748fc2382e1e8629f79bcd4b75c490f7
-
SSDEEP
49152:kXeNOuzHeGGUCwhkfofCfokLi/sazR0BSCpmoLBin9VO3Q59HU1f:kXtwhkfo6gkLixR0BSChiO3wlof
Static task
static1
Behavioral task
behavioral1
Sample
2024-08-16_8011acea0e5030f608593fb802e517db_avoslocker_hijackloader_rhadamanthys.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-08-16_8011acea0e5030f608593fb802e517db_avoslocker_hijackloader_rhadamanthys.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
1.0.7
AGOSTO
windowsconection.duckdns.org:3030
SMN4GzHZREaPq56YwtzqnQ
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2024-08-16_8011acea0e5030f608593fb802e517db_avoslocker_hijackloader_rhadamanthys
-
Size
3.2MB
-
MD5
8011acea0e5030f608593fb802e517db
-
SHA1
8c1c5aa5194d74f8cc1424a25512f45ee8404725
-
SHA256
0a2ed20b002c7738de9b99d5c47d51d473109f0b83a404675559acd9a74f2d0b
-
SHA512
dae41758d3329adbcf3ef9788dd84c2bba1b6535da99933f21c9fcf68cad276f0481466f87810614c3b9493b4007a52a748fc2382e1e8629f79bcd4b75c490f7
-
SSDEEP
49152:kXeNOuzHeGGUCwhkfofCfokLi/sazR0BSCpmoLBin9VO3Q59HU1f:kXtwhkfo6gkLixR0BSChiO3wlof
Score10/10-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-