General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.dropbox.com/scl/fi/y5wasrxlkpex7azpvlbaj/ForumeStatementFile_cYxvzlgXVLEuAG.zip?rlkey=fbo37h19sa4dief3n1e78ni21&st=8561z56x&dl=1
Resource
win10v2004-20240802-en
21 signatures
300 seconds
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
gregorymadensky.sytes.net:4444
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Targets
-
-
Target
https://www.dropbox.com/scl/fi/y5wasrxlkpex7azpvlbaj/ForumeStatementFile_cYxvzlgXVLEuAG.zip?rlkey=fbo37h19sa4dief3n1e78ni21&st=8561z56x&dl=1
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-