General
-
Target
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d
-
Size
426KB
-
Sample
240829-2l4f2sxajp
-
MD5
eafad63994d7226e68bb54d7a9396e91
-
SHA1
acc49ad9a05403be2079f48954a397251a5b124b
-
SHA256
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d
-
SHA512
6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b
-
SSDEEP
3072:bAa0zeTpio4F+B1MFnMUE2XAVLis8sIQaaBbnkuKMdcKQsd7WyxM1J0C1HzKyL:lTpq+w1MzaAVJ51LKMjpWy2J0oKyL
Static task
static1
Behavioral task
behavioral1
Sample
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d.exe
Resource
win10-20240404-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
USA ONLY
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:5454
127.0.0.1:7898
127.0.0.1:8987
verygoodpc.line.pm:6606
verygoodpc.line.pm:7707
verygoodpc.line.pm:8808
verygoodpc.line.pm:5454
verygoodpc.line.pm:7898
verygoodpc.line.pm:8987
verygoodpcs.theworkpc.com:6606
verygoodpcs.theworkpc.com:7707
verygoodpcs.theworkpc.com:8808
verygoodpcs.theworkpc.com:5454
verygoodpcs.theworkpc.com:7898
verygoodpcs.theworkpc.com:8987
mc-neo-host
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d
-
Size
426KB
-
MD5
eafad63994d7226e68bb54d7a9396e91
-
SHA1
acc49ad9a05403be2079f48954a397251a5b124b
-
SHA256
ad2315d49459ab240df61af4f6e336f310c470ec33f8bec1cb8d4fb16b48ae9d
-
SHA512
6d8181c1229a47333114c9b0e1ee2f333301bc3e774b9d7ecee8d5ae87751bd605508f9fd4ce77a20673996bcb9dc2ccc70f62e837fe0089bdc0478a4d301f4b
-
SSDEEP
3072:bAa0zeTpio4F+B1MFnMUE2XAVLis8sIQaaBbnkuKMdcKQsd7WyxM1J0C1HzKyL:lTpq+w1MzaAVJ51LKMjpWy2J0oKyL
-
Modifies WinLogon for persistence
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-