General
-
Target
0269a17c1d15a00cda8161abdccc96ac446dd15379b0828463093fe4c40afc64.unknown
-
Size
6KB
-
Sample
240919-gvqlbsvbqq
-
MD5
26b251a59dc03f6ce1503678d0dddfd2
-
SHA1
cfa1814660079da10073d0e78d3277f83c40d3fc
-
SHA256
0269a17c1d15a00cda8161abdccc96ac446dd15379b0828463093fe4c40afc64
-
SHA512
d68634da8b45ca9457364ac6e67e79f6fa689e08ddc4fae443c08f8af563728fff25128bae6f49348ce2c4d4aab78727248bdace6e5f1e994d7f8dfba44808c0
-
SSDEEP
96:ur2TPTPXoPlhotyH9/qLr2TPTPXoPlhotyH9/qo:u6csYH9/qL6csYH9/qo
Static task
static1
Behavioral task
behavioral1
Sample
0269a17c1d15a00cda8161abdccc96ac446dd15379b0828463093fe4c40afc64.wsf
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
Default
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/89imXRj4
Targets
-
-
Target
0269a17c1d15a00cda8161abdccc96ac446dd15379b0828463093fe4c40afc64.unknown
-
Size
6KB
-
MD5
26b251a59dc03f6ce1503678d0dddfd2
-
SHA1
cfa1814660079da10073d0e78d3277f83c40d3fc
-
SHA256
0269a17c1d15a00cda8161abdccc96ac446dd15379b0828463093fe4c40afc64
-
SHA512
d68634da8b45ca9457364ac6e67e79f6fa689e08ddc4fae443c08f8af563728fff25128bae6f49348ce2c4d4aab78727248bdace6e5f1e994d7f8dfba44808c0
-
SSDEEP
96:ur2TPTPXoPlhotyH9/qLr2TPTPXoPlhotyH9/qo:u6csYH9/qL6csYH9/qo
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-