General
-
Target
JaffaCakes118_5987d190c640cafc02bd5e0b7b023d7c793b25fc6af38ce7f541368683fc6b66
-
Size
68KB
-
Sample
241229-1xt63sxrhk
-
MD5
59381e83e0f10a3b40cce6c623300bab
-
SHA1
74cc3e19a08c6fa54089c8d71b35dce64c644f2d
-
SHA256
5987d190c640cafc02bd5e0b7b023d7c793b25fc6af38ce7f541368683fc6b66
-
SHA512
6847bbb9ecc22ebf6eab11ca231c079740e905a39f01919be564d12a6e7553678c5c4dd4c7a19ecf7e79004fb2ce6fea305169bb0c673790feddf194aca01e7f
-
SSDEEP
1536:VGePQZPcWJE8V5MJugVgJUQBZmFqf9q/FJ+:cOWSqgVgJhQysP+
Static task
static1
Behavioral task
behavioral1
Sample
document.ps1
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
BAT
mrv00100.publicvm.com:6666
AsyncMutex_mrv00
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
document.PS1
-
Size
237KB
-
MD5
701750fca8e3b1a06e11c0e4971f7780
-
SHA1
d5be6d794bca204eb189dfc2f38b98ef0dce6302
-
SHA256
a20e52332a44c134f904d2ebcb779c46d397691ff5629812a6330774cad25b8d
-
SHA512
87241bbe70c41c86cefe02e9b980be5b7c8ec6037af8edd94ea9f6628f39aafa801aa1bf3c8d512b603bebea724d8dae5c15af3760a18e8f23ebff8c5b56afce
-
SSDEEP
3072:D2CD6RnNwZO2zD3N3AppqBMwIv1vZzd24Qzc:aCD6zGO2zD3N3Ap6Mg4Qzc
-
Asyncrat family
-
Suspicious use of SetThreadContext
-