General
-
Target
be821d48efa0a9eb55545e3130ddb4c1.bin
-
Size
928B
-
Sample
241018-b63gdascpm
-
MD5
6d548a3012f22350ee42d2bc97283c32
-
SHA1
564718bcdd98b6a88c522c7707c67b7266e81404
-
SHA256
3853dfa3da45f97cfe55c9ed4deb91da5ff2dd64727d0a6931f19e3cf6c362b2
-
SHA512
d251ea01b643e5b612038e00ba92cba64b7b4827c9df5235d155932c7f28cf2ea264d8e491a7fe175929dc41bdd9c088da6b704fa012d2fd908cd79b3f5c9fd9
Static task
static1
Behavioral task
behavioral1
Sample
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
MADO-Marco
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/yWgaKKwH
Targets
-
-
Target
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487.vbs
-
Size
5KB
-
MD5
be821d48efa0a9eb55545e3130ddb4c1
-
SHA1
21c3bf46f4a2f5da81069bc82cacd5e68afa0e78
-
SHA256
7c90be507201a13383ab3f2eaebc6e8ddef40981892ee4464a16b4e04c455487
-
SHA512
8a4a4aecfb85bbafca7a0827937c6322a5992df78d606b9b0dc9124ec9d27e33853a645586c132337c53bb9f2c82bf4aaf76290b8206f7fd96e93c0f7155bd33
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTT+:etPXyTuGZOrHTu5ViajP
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-