General
-
Target
Aircraft PN#_Desc_&_Qty Details.vbs
-
Size
2.7MB
-
Sample
240820-xx7wdssfkr
-
MD5
b6a6e732e7843e8af8468793eaaa294f
-
SHA1
4de793698450915e784e3a7f9df99b5b74241979
-
SHA256
43a46c8866fdd9b7fb23d0d2ab7a2676f0637333e500cf4e32ae3bc0b88028ae
-
SHA512
e37f804bb9020e51ac1ba8381aeda15ad5a2dde6ac875478fe0c5e6d3dbcebc38b6ee752604b21174b8198752219ed98e4bd423a0c24e1fa541d2d18c89b6e24
-
SSDEEP
768:pddddduddddddddduddddddddduddddddddduddddddddduddddddddduddddddo:TVKgi
Static task
static1
Behavioral task
behavioral1
Sample
Aircraft PN#_Desc_&_Qty Details.vbs
Resource
win7-20240704-en
Malware Config
Extracted
https://bitbucket.org/556ghfhgfhgf/fdsfdsf/downloads/dllhope.txt
Extracted
asyncrat
0.5.8
Putty
krecgh.4cloud.click:6943
OjZL4DoWlVCn
-
delay
3
-
install
false
-
install_file
Automatic Settings.exe
-
install_folder
%AppData%
Targets
-
-
Target
Aircraft PN#_Desc_&_Qty Details.vbs
-
Size
2.7MB
-
MD5
b6a6e732e7843e8af8468793eaaa294f
-
SHA1
4de793698450915e784e3a7f9df99b5b74241979
-
SHA256
43a46c8866fdd9b7fb23d0d2ab7a2676f0637333e500cf4e32ae3bc0b88028ae
-
SHA512
e37f804bb9020e51ac1ba8381aeda15ad5a2dde6ac875478fe0c5e6d3dbcebc38b6ee752604b21174b8198752219ed98e4bd423a0c24e1fa541d2d18c89b6e24
-
SSDEEP
768:pddddduddddddddduddddddddduddddddddduddddddddduddddddddduddddddo:TVKgi
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-