General
-
Target
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
-
Size
5KB
-
Sample
241017-b8wfvawcjf
-
MD5
be821d48efa0a9eb55545e3130ddb4c1
-
SHA1
21c3bf46f4a2f5da81069bc82cacd5e68afa0e78
-
SHA256
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487
-
SHA512
8a4a4aecfb85bbafca7a0827937c6322a5992df78d606b9b0dc9124ec9d27e33853a645586c132337c53bb9f2c82bf4aaf76290b8206f7fd96e93c0f7155bd33
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTT+:etPXyTuGZOrHTu5ViajP
Static task
static1
Behavioral task
behavioral1
Sample
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
MADO-Marco
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/yWgaKKwH
Targets
-
-
Target
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
-
Size
5KB
-
MD5
be821d48efa0a9eb55545e3130ddb4c1
-
SHA1
21c3bf46f4a2f5da81069bc82cacd5e68afa0e78
-
SHA256
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487
-
SHA512
8a4a4aecfb85bbafca7a0827937c6322a5992df78d606b9b0dc9124ec9d27e33853a645586c132337c53bb9f2c82bf4aaf76290b8206f7fd96e93c0f7155bd33
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTT+:etPXyTuGZOrHTu5ViajP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-