General
-
Target
https://www.dropbox.com/scl/fi/tk0omas0v34lb2cktmns6/ForumeStatementFile_DqwpzdJFmHAKxq.zip?rlkey=79s6qdnif5b0m1y2qcgohs60w&st=6vv2vper&dl=1
-
Sample
240820-tpxtns1fqh
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/scl/fi/tk0omas0v34lb2cktmns6/ForumeStatementFile_DqwpzdJFmHAKxq.zip?rlkey=79s6qdnif5b0m1y2qcgohs60w&st=6vv2vper&dl=1
Resource
win10v2004-20240802-en
Malware Config
Extracted
asyncrat
Xchallenger | 3Losh
RAMIserverNGNET
anothonesevenfivesecsned.ddns.net:6666
AsyncMutex_k2D8ja65kBaVT1RR
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
https://www.dropbox.com/scl/fi/tk0omas0v34lb2cktmns6/ForumeStatementFile_DqwpzdJFmHAKxq.zip?rlkey=79s6qdnif5b0m1y2qcgohs60w&st=6vv2vper&dl=1
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-