General
-
Target
Agreements.js
-
Size
163KB
-
Sample
250113-qspqpatmct
-
MD5
cb7541f8671eb6b42ce0a58de6973c9b
-
SHA1
aebfdd104f8883f35aa9818cc3a9e2248c8d3379
-
SHA256
a45962b3f4ff99334a43e3fea7ca89bc324ed95c3eb14406ccc1701141147013
-
SHA512
8a735f9261b829951fc00ade7ad065c3d5fac6387c1344bbd3130793c71dd6d5764f43324dc2f0577941ec422480844520575d496408f2df9c54931c30d1c533
-
SSDEEP
1536:c8uNnKlC9130ibAHEGlexE7Ea9ERy4rDqm4SzQ6VIYWij5zeDJKg0tW7exmbcAOp:c8WnKM9abHcqUqYzQ6V2id8U
Static task
static1
Behavioral task
behavioral1
Sample
Agreements.js
Resource
win7-20240903-en
Malware Config
Extracted
https://res.cloudinary.com/dc12ss6tu/image/upload/v1736761789/giqxrtx59cniopnbdvxz.jpg
https://res.cloudinary.com/dc12ss6tu/image/upload/v1736761789/giqxrtx59cniopnbdvxz.jpg
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
Default
185.196.10.147:4449
naiiqsunoewliwauv
-
delay
3
-
install
false
-
install_folder
%AppData%
Targets
-
-
Target
Agreements.js
-
Size
163KB
-
MD5
cb7541f8671eb6b42ce0a58de6973c9b
-
SHA1
aebfdd104f8883f35aa9818cc3a9e2248c8d3379
-
SHA256
a45962b3f4ff99334a43e3fea7ca89bc324ed95c3eb14406ccc1701141147013
-
SHA512
8a735f9261b829951fc00ade7ad065c3d5fac6387c1344bbd3130793c71dd6d5764f43324dc2f0577941ec422480844520575d496408f2df9c54931c30d1c533
-
SSDEEP
1536:c8uNnKlC9130ibAHEGlexE7Ea9ERy4rDqm4SzQ6VIYWij5zeDJKg0tW7exmbcAOp:c8WnKM9abHcqUqYzQ6V2id8U
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-