General
-
Target
201f42fefc3fe9ccb91d681c146f9b71.vbs
-
Size
6.2MB
-
Sample
241018-b6y4ysyhld
-
MD5
201f42fefc3fe9ccb91d681c146f9b71
-
SHA1
bff72444888b11c5b5d03eb407af7d2f88b49960
-
SHA256
b026259f2b7111c2f22846579fee6daf50b10a983eaa91d4e1f93c65d4887348
-
SHA512
9dc8d1a9ec32b3b54220f644ec85f173d98df1e16247e1f23556f348e546deebba7924cd2c7ddb692bfc39dd8dacbc84118287f8d94282192c91558c3726169d
-
SSDEEP
384:+555X555X555X555W555X555X555X555n555X555X555X555W555X555X555X55P:Y
Static task
static1
Behavioral task
behavioral1
Sample
201f42fefc3fe9ccb91d681c146f9b71.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://pastebin.com/raw/J6uRjZrv
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
dcrat13.duckdns.org:3013
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
201f42fefc3fe9ccb91d681c146f9b71.vbs
-
Size
6.2MB
-
MD5
201f42fefc3fe9ccb91d681c146f9b71
-
SHA1
bff72444888b11c5b5d03eb407af7d2f88b49960
-
SHA256
b026259f2b7111c2f22846579fee6daf50b10a983eaa91d4e1f93c65d4887348
-
SHA512
9dc8d1a9ec32b3b54220f644ec85f173d98df1e16247e1f23556f348e546deebba7924cd2c7ddb692bfc39dd8dacbc84118287f8d94282192c91558c3726169d
-
SSDEEP
384:+555X555X555X555W555X555X555X555n555X555X555X555W555X555X555X55P:Y
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-