General
-
Target
Dmningsanlg.cmd
-
Size
5KB
-
Sample
241111-v9veqasgqa
-
MD5
c3740f8a31835df5862ca4dcca3f046c
-
SHA1
fe66ea2e8830e2e05c33b2f57dde0667fcee046a
-
SHA256
5ec6b19b04ce92c96099d82aa9f698afea763e0dd95fa33fcda302028c1ba931
-
SHA512
d4edf552833604b184a21a095ff69be1cc260b7a31e0c5f6e02d52d8c5df9b19d315585493d0a9d8edca21f0272e5795e7f9fb3c0d05935dc11f7183a0ed7fbd
-
SSDEEP
96:fxgDNkSWe+Y7mM2lIg3WU+ynD0jwDOe7o/SJCRNE7/WtBFCV4N6AWYs9skq7WSPu:fcWJY7J2B9+AD0jwDOe7mkCRNoWLFK4i
Static task
static1
Behavioral task
behavioral1
Sample
Dmningsanlg.cmd
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
| Edit by Vinom Rat
8nyyyy
newrdb30.ooguy.com:2004
AsyncMutex_6zcxrdjgnjGnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Dmningsanlg.cmd
-
Size
5KB
-
MD5
c3740f8a31835df5862ca4dcca3f046c
-
SHA1
fe66ea2e8830e2e05c33b2f57dde0667fcee046a
-
SHA256
5ec6b19b04ce92c96099d82aa9f698afea763e0dd95fa33fcda302028c1ba931
-
SHA512
d4edf552833604b184a21a095ff69be1cc260b7a31e0c5f6e02d52d8c5df9b19d315585493d0a9d8edca21f0272e5795e7f9fb3c0d05935dc11f7183a0ed7fbd
-
SSDEEP
96:fxgDNkSWe+Y7mM2lIg3WU+ynD0jwDOe7o/SJCRNE7/WtBFCV4N6AWYs9skq7WSPu:fcWJY7J2B9+AD0jwDOe7mkCRNoWLFK4i
-
Asyncrat family
-
Blocklisted process makes network request
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-