General
-
Target
d320aea9453c098f7b07ac1da85a9e7e.bin
-
Size
931B
-
Sample
241018-cajj3azbne
-
MD5
268b882e124ebb64cc5c747cfd3760a1
-
SHA1
657eefdfa1dd83e80655ffe77deb3f2b8e53765f
-
SHA256
f18b89650fa93a5d72575293d09140f57e9b390ac1079968b3f3b2b53cbe6663
-
SHA512
1fb191cef56225cf48a7ed165311d61f216d284d3ea007c8dfce6b6b9a2488f5677dd6ee1c2aa831e85c1bf22931e9f6f416d2a9177a2023acd2cf68624e59e4
Static task
static1
Behavioral task
behavioral1
Sample
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
New-Encrypt
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/M1nmWeTA
Targets
-
-
Target
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613.vbs
-
Size
5KB
-
MD5
d320aea9453c098f7b07ac1da85a9e7e
-
SHA1
1fcf8469a5b7197cca73c9665f43505d7a6c6ae3
-
SHA256
a823fe41d388ef2f59ba4ed377c6d4708115a9551089d95f066e116a608b8613
-
SHA512
2d883ac60a84b0e919274daec84bc5a6dbed9f1eb40f5dab6c1473d321211e245a27dcdc2ed4e9f9ed7ab9e08048ee3d34da333ad5cb950a2d934b59b20fb7bd
-
SSDEEP
48:epIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIjIrOTTS:etPXyTuGZOrHTu5Viajr
Score10/10-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-