General
-
Target
ID-PCTS8435.js
-
Size
2KB
-
Sample
241115-xe1z5aymgw
-
MD5
9881a8b65b41433a8d7a3bb68f382e94
-
SHA1
5d7b75c19bf11e1a3996a83258030759344d67b1
-
SHA256
0909faba191b7f68cc08f8fc4c4adeb91224086fdd79ce5b050811747afd00ce
-
SHA512
7c555e960b1c9e9e8b3d89ce68b7dc1cdc230afcb3ca6cbab22f92aa72ac1e3a7a16a17e1725580f33dd8fa136ad3d7c350fd2d4e20c9378f28b46b8112c7080
Static task
static1
Behavioral task
behavioral1
Sample
ID-PCTS8435.js
Resource
win7-20240708-en
Malware Config
Extracted
http://66.206.25.2/1/text.txt
Extracted
http://66.206.25.2/1/text.txt
Extracted
asyncrat
| Edit 3LOSH RAT
TNWork
tnwork.kozow.com:5566
AsyncMutex_6SI8fhjfhj
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
ID-PCTS8435.js
-
Size
2KB
-
MD5
9881a8b65b41433a8d7a3bb68f382e94
-
SHA1
5d7b75c19bf11e1a3996a83258030759344d67b1
-
SHA256
0909faba191b7f68cc08f8fc4c4adeb91224086fdd79ce5b050811747afd00ce
-
SHA512
7c555e960b1c9e9e8b3d89ce68b7dc1cdc230afcb3ca6cbab22f92aa72ac1e3a7a16a17e1725580f33dd8fa136ad3d7c350fd2d4e20c9378f28b46b8112c7080
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-