General
-
Target
03122024_1407_Drawing&specification.scr.iso
-
Size
1.5MB
-
Sample
241203-rfbtqsylfv
-
MD5
77f7a1479649881933cf583f591a4078
-
SHA1
82ad7cced45ed5450af0284593f24b87c7017158
-
SHA256
af3f13c8612eaffa17ce8c41933bcbd89071394057940536ce61eea285fe286e
-
SHA512
b294d5b67828daf1535e3a332fa9d813d89c5b0ef919dec8dd7c3331f9be297f37cc5fc0d1cb046b5a5d6420774ef821a6e8e62574238193f2ad20186be13443
-
SSDEEP
24576:Ou6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:Au0c++OCvkGs9FaNhkZY
Static task
static1
Behavioral task
behavioral1
Sample
Drawing&specification.scr
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
Default
69.174.100.131:6606
abkZfsCYRZhk
-
delay
10
-
install
false
-
install_file
order.exe
-
install_folder
%AppData%
Targets
-
-
Target
Drawing&specification.scr
-
Size
945KB
-
MD5
bc18b6803a287e63b3668b5817f12419
-
SHA1
bc21190df092d93629068c705ea8dc630d3db4a4
-
SHA256
8f42d1e07595808544eed18a45e8d7220dff40597d4d53d0f63fab47554afbdf
-
SHA512
2c29abcd294fd09e39cb604192628c2e4aa71241575ac38644c0fd7e5ac6b77c1f12302003636f166747d7b44649c7a9d31915e1b2c6c5fa09201428187c59e2
-
SSDEEP
24576:nu6J33O0c+JY5UZ+XC0kGso6FaNXpPkMeCWY:hu0c++OCvkGs9FaNhkZY
-
Asyncrat family
-
Drops startup file
-
Executes dropped EXE
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-