General
-
Target
9075_output.zip
-
Size
53KB
-
Sample
241226-2x1vastrbr
-
MD5
a44022db1ef050e11bbace7e0e6650f3
-
SHA1
df47d00f161075de9ab4de13c376b1ace096b201
-
SHA256
b93f7a6bc00060f35012a98f0752f39b1293bdfc064274522031ace0486c5f05
-
SHA512
7ed7452068c7906d68a0600ea42360526e933cab8883977af96efa506f2d51a20212add7965c984ac96ded911b57a360a8c1f920221c74da5ba8d26b81fc4415
-
SSDEEP
1536:Va2DgN3LHeZ1P/vURjELAFoQrf9P9E2dn:VavpeZ1PnU1swlj9qw
Static task
static1
Behavioral task
behavioral1
Sample
1557_output.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
1557_output.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1557_output.vbs
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
1557_output.vbs
Resource
win11-20241007-en
Malware Config
Extracted
asyncrat
0.5.8
Default
87.120.113.125:2101
87.120.113.125:55644
E0GLVPl3iUqi
-
delay
3
-
install
false
-
install_file
winserve.exe
-
install_folder
%AppData%
Targets
-
-
Target
1557_output.vbs
-
Size
203KB
-
MD5
f340313af69ff225bf85f71c378fea27
-
SHA1
d2fcf71d1859866d252a193f87e6b5d017c0ae45
-
SHA256
57214b92aadf1f587a98a0d0eacaf47aae8516c18c5e96b7745e32b6c079a3d1
-
SHA512
2dc362628b59743473c5a899f77af49020876e8236c521a63c5c92aef4553c1d003c96e684279353ab67a96245cade13bbe372b5f28183f306e4275d82c10f11
-
SSDEEP
1536:abfH0Kj+S44//vsnrRBJZ/iJLerpid/jBCj48xvR5+DdmlZO:a7H0Kj+STnvsnVPZ/igrEOxvR5+xmlZO
-
Asyncrat family
-
Async RAT payload
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-