General
-
Target
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
-
Size
5KB
-
Sample
241017-ckec4azfnr
-
MD5
d320aea9453c098f7b07ac1da85a9e7e
-
SHA1
1fcf8469a5b7197cca73c9665f43505d7a6c6ae3
-
SHA256
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613
-
SHA512
2d883ac60a84b0e919274daec84bc5a6dbed9f1eb40f5dab6c1473d321211e245a27dcdc2ed4e9f9ed7ab9e08048ee3d34da333ad5cb950a2d934b59b20fb7bd
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTTS:etPXyTuGZOrHTu5Viajr
Static task
static1
Behavioral task
behavioral1
Sample
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
New-Encrypt
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/M1nmWeTA
Targets
-
-
Target
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
-
Size
5KB
-
MD5
d320aea9453c098f7b07ac1da85a9e7e
-
SHA1
1fcf8469a5b7197cca73c9665f43505d7a6c6ae3
-
SHA256
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613
-
SHA512
2d883ac60a84b0e919274daec84bc5a6dbed9f1eb40f5dab6c1473d321211e245a27dcdc2ed4e9f9ed7ab9e08048ee3d34da333ad5cb950a2d934b59b20fb7bd
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTTS:etPXyTuGZOrHTu5Viajr
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-