General
-
Target
asegurar.vbs
-
Size
2.6MB
-
Sample
241203-r42easvnaj
-
MD5
3c6884c4d3a5348a023bf408ea0f9715
-
SHA1
86f369b8381c094535e6c77af39609d556797bfe
-
SHA256
68261a28c46b6107abe48b767a31c161c932a2371c64dfff49db820ec3b2e312
-
SHA512
9e4ba2e50ffc6ae7d49ba0d77bf746c4ddcc139d1b3e20ee55c2ff403497046693cefaf8ec64a13a8eae74f95fbf288e12b1170b08ab50cd67e78fe6cfdbcfb1
-
SSDEEP
192:blLUdjoZvsBef7e3vtEMUETN9Bgdm6wVvl:cGb7SOE90m6w/
Static task
static1
Behavioral task
behavioral1
Sample
asegurar.vbs
Resource
win7-20240903-en
Malware Config
Extracted
https://pastebin.com/raw/Adv9gBHa
https://pastebin.com/raw/Adv9gBHa
Extracted
asyncrat
1.0.7
tarea 2
02dic.duckdns.org:8000
DcRatMutex_qwsafun
-
delay
1
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
asegurar.vbs
-
Size
2.6MB
-
MD5
3c6884c4d3a5348a023bf408ea0f9715
-
SHA1
86f369b8381c094535e6c77af39609d556797bfe
-
SHA256
68261a28c46b6107abe48b767a31c161c932a2371c64dfff49db820ec3b2e312
-
SHA512
9e4ba2e50ffc6ae7d49ba0d77bf746c4ddcc139d1b3e20ee55c2ff403497046693cefaf8ec64a13a8eae74f95fbf288e12b1170b08ab50cd67e78fe6cfdbcfb1
-
SSDEEP
192:blLUdjoZvsBef7e3vtEMUETN9Bgdm6wVvl:cGb7SOE90m6w/
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-