General
-
Target
RoundTripItinerarydetails.vbs
-
Size
780B
-
Sample
250121-z6fjls1rgk
-
MD5
44a1dc576cca328a09abc1747cfc6984
-
SHA1
30edd4c5e409ed9702b2ae4a5d16c07dde4e873c
-
SHA256
dac02b322f310cdaa789470be4bbf41fa842781a8010c06aaa346f1e87f96b72
-
SHA512
af3d479790b667aeb268c5304f2490c8d17c669de48ecb5222c9c6c900f3c289417878af5fd5faca16bb543ae5097ae2073f10d5ea80138ff82aaa246b23e534
Static task
static1
Behavioral task
behavioral1
Sample
RoundTripItinerarydetails.vbs
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
0.5.8
SAFEMODE
BobbyMiller09.bumbleshrimp.com:1987
cQWO7Q45k2CY
-
delay
3
-
install
false
-
install_file
srtsfsuytrrd.exe
-
install_folder
%AppData%
Targets
-
-
Target
RoundTripItinerarydetails.vbs
-
Size
780B
-
MD5
44a1dc576cca328a09abc1747cfc6984
-
SHA1
30edd4c5e409ed9702b2ae4a5d16c07dde4e873c
-
SHA256
dac02b322f310cdaa789470be4bbf41fa842781a8010c06aaa346f1e87f96b72
-
SHA512
af3d479790b667aeb268c5304f2490c8d17c669de48ecb5222c9c6c900f3c289417878af5fd5faca16bb543ae5097ae2073f10d5ea80138ff82aaa246b23e534
-
Asyncrat family
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Suspicious use of SetThreadContext
-