General
-
Target
fb581e31392f4c4b115ecd10f5e0e78172d24dd21f29d154b4c9aac0d37b1bd4.vbs
-
Size
487KB
-
Sample
241002-b5ghhs1dkn
-
MD5
b986c08f0e2537c2d572e38cc589b819
-
SHA1
92c7c84cbbff104cd17f85008c1941a9cfdfa4da
-
SHA256
fb581e31392f4c4b115ecd10f5e0e78172d24dd21f29d154b4c9aac0d37b1bd4
-
SHA512
1bfb7df73543a2ba983a80997d4d01e6ae3cf9b8ca15c3aab9bc9e55cdd0b5fd3ec0f269d090b99c5debc95e4af6624a90bf066e40e51bd04b68e5a74ebd02f3
-
SSDEEP
12288:busUyrshNMpnRa3/osFHbEahhxdSaq2JUqoq3DvAA5hrnv0xaKZSfCA:bbUjEs3/oUcaqmfJ
Static task
static1
Behavioral task
behavioral1
Sample
fb581e31392f4c4b115ecd10f5e0e78172d24dd21f29d154b4c9aac0d37b1bd4.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
Extracted
asyncrat
1.0.7
Tar 30
winsrr14.duckdns.org:9005
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
fb581e31392f4c4b115ecd10f5e0e78172d24dd21f29d154b4c9aac0d37b1bd4.vbs
-
Size
487KB
-
MD5
b986c08f0e2537c2d572e38cc589b819
-
SHA1
92c7c84cbbff104cd17f85008c1941a9cfdfa4da
-
SHA256
fb581e31392f4c4b115ecd10f5e0e78172d24dd21f29d154b4c9aac0d37b1bd4
-
SHA512
1bfb7df73543a2ba983a80997d4d01e6ae3cf9b8ca15c3aab9bc9e55cdd0b5fd3ec0f269d090b99c5debc95e4af6624a90bf066e40e51bd04b68e5a74ebd02f3
-
SSDEEP
12288:busUyrshNMpnRa3/osFHbEahhxdSaq2JUqoq3DvAA5hrnv0xaKZSfCA:bbUjEs3/oUcaqmfJ
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-