General
-
Target
toto.zip.zip
-
Size
41.9MB
-
Sample
241018-hmqrssshrc
-
MD5
b8b04b30f6f80df8a9c020c6a49145a1
-
SHA1
c065f3a0f4b98e12fa437662f86c810c33f1a491
-
SHA256
5485535d6df60b75e254dfab35e05055816403c0b4509a6a60b5c377ea075f16
-
SHA512
6dd93a5293914255ba19cc878e37e35e7bc3161387b263bcd0ba3560809c6bd93a3f2fef02749b0eb254a77144df3536c65c0872b96a833d106f3db660832b6e
-
SSDEEP
786432:t+bCNr9olo4BZ86l6fVu+ZZ62L0GwIEw/abWJaQJyHcNciQwoK:trNr9oS9a+VBD0nIEw/aby8twL
Static task
static1
Behavioral task
behavioral1
Sample
toto.zip
Resource
win10v2004-20241007-de
Malware Config
Extracted
asyncrat
Default
101.99.92.203:3232
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
toto.zip
-
Size
42.8MB
-
MD5
b0c6737d9b1f9ffd3114f79712c6be96
-
SHA1
dd74f7195b62d2343315a75fbeb999c2e94d2028
-
SHA256
f864ce25cc2ad1f888d62e0bb40c6567b9c8f89c5d96e82135335a9caa956593
-
SHA512
ea3f7f25a8c4c51fa8d356913a068bda08099e565458595745dcf0aedd4c6e8288be7608010064032a6cbb6a1cff3e9c28f1d660ac5a158c5ef7deaf6f4b8e1e
-
SSDEEP
786432:CDXXuerfHkIZf06hLwbl9Pm2TW38ZF+oxwk4fbSep827/SWt:CDnXfHkIZcXM2TdZooxwnXTSQ
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Async RAT payload
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-