General
-
Target
2810c06ccf0230a24179363862bfd4e88dab05b1b39fb229d75b8f01973fdb80.vbs
-
Size
1.9MB
-
Sample
241203-cm1n4svkd1
-
MD5
bb16b36f5fe5781959183b0acd63de8b
-
SHA1
f764941cab201f441d31edd23120961966799880
-
SHA256
2810c06ccf0230a24179363862bfd4e88dab05b1b39fb229d75b8f01973fdb80
-
SHA512
57b422dd4cb49dca2e4f3a143c6a995f574f407be5e4c1cdd2b6b20ff422df59732bacf501a0988799d8c40e33f6af1791035461ee2d4e740e33da42d35eea06
-
SSDEEP
192:DlVUdVoZvsBef7e3vtEMUETN9BgKm6w56Hy:CQb7SOE9Tm6wd
Static task
static1
Behavioral task
behavioral1
Sample
2810c06ccf0230a24179363862bfd4e88dab05b1b39fb229d75b8f01973fdb80.vbs
Resource
win7-20240729-en
Malware Config
Extracted
https://pastebin.com/raw/Adv9gBHa
https://pastebin.com/raw/Adv9gBHa
Extracted
asyncrat
1.0.7
tarea 2
wins.cooempresasltda5.store:8000
DcRatMutex_qwsafun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
2810c06ccf0230a24179363862bfd4e88dab05b1b39fb229d75b8f01973fdb80.vbs
-
Size
1.9MB
-
MD5
bb16b36f5fe5781959183b0acd63de8b
-
SHA1
f764941cab201f441d31edd23120961966799880
-
SHA256
2810c06ccf0230a24179363862bfd4e88dab05b1b39fb229d75b8f01973fdb80
-
SHA512
57b422dd4cb49dca2e4f3a143c6a995f574f407be5e4c1cdd2b6b20ff422df59732bacf501a0988799d8c40e33f6af1791035461ee2d4e740e33da42d35eea06
-
SSDEEP
192:DlVUdVoZvsBef7e3vtEMUETN9BgKm6w56Hy:CQb7SOE9Tm6wd
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-