General
-
Target
police.zip
-
Size
972B
-
Sample
241122-mpwhaaypgx
-
MD5
5ca963d18d77aaf56c141efd52c3747f
-
SHA1
79143863621947df8f6c0596f4419d7f1e935188
-
SHA256
3442a9e4f21d14a478076694bf1dd44268e950262270e7637936c05657531462
-
SHA512
8bd1395a1129b246bf364b67dccc8eb63b50e948924e0870d7dc5c03a3a16a2f7808842b888cdc21fcb2dff7cf13fe061239c3941e03d40e75fc084e883b1d60
Static task
static1
Behavioral task
behavioral1
Sample
Sat.bat
Resource
win7-20240903-en
Malware Config
Extracted
http://109.199.101.109:770/xx.jpg
Extracted
asyncrat
AWS | 3Losh
Default
samsalah1.freeddns.org:1005
AsyncMutex_alosh
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Sat.bat
-
Size
2KB
-
MD5
0e2fff554ddadc58aaff7978ec06aa32
-
SHA1
b453b17905235ea96150c90711285f7879d3afc0
-
SHA256
64c79060f8478363e93ae210e0bd7ba9178fecdd1a0badba4fed5382180d3a80
-
SHA512
c54cc4c956dc733835d0d40d49377b23b8b63bfa118e0e9ed5bba18e2b2b5f4a33656cd5b75230cd7dec05a98a3bc4b84b429121cffe3644fff72fc628b83b76
-
Asyncrat family
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Suspicious use of SetThreadContext
-