General
-
Target
fb0adc9c82a462297f7be357e0272b3b8d0f1af106580e7aa64f6108c40658ea.ps1
-
Size
440KB
-
Sample
250127-vxnreazlgp
-
MD5
f405f22335b325746fc2c92892af92e9
-
SHA1
720b78fe3afb353d94271fc2255b629042432c6a
-
SHA256
fb0adc9c82a462297f7be357e0272b3b8d0f1af106580e7aa64f6108c40658ea
-
SHA512
1887a8de5cbd6a119ca77c250b36d9b965a704fb9ad75a363fc4cc67ed46f84bb3d63e0f2aab5f8bce539a21fca9cc9f517905ce26f40317770d33d7bbf91ab4
-
SSDEEP
1536:bkdW/z20+u4dXNR8WrlDn9lVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dr:beYw7Ev1P4RtluaB1
Static task
static1
Behavioral task
behavioral1
Sample
fb0adc9c82a462297f7be357e0272b3b8d0f1af106580e7aa64f6108c40658ea.ps1
Resource
win7-20240903-en
Malware Config
Extracted
asyncrat
AWS | 3Losh
Fox_Mado
0000_000
-
delay
3
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/r3hJ4btd
Targets
-
-
Target
fb0adc9c82a462297f7be357e0272b3b8d0f1af106580e7aa64f6108c40658ea.ps1
-
Size
440KB
-
MD5
f405f22335b325746fc2c92892af92e9
-
SHA1
720b78fe3afb353d94271fc2255b629042432c6a
-
SHA256
fb0adc9c82a462297f7be357e0272b3b8d0f1af106580e7aa64f6108c40658ea
-
SHA512
1887a8de5cbd6a119ca77c250b36d9b965a704fb9ad75a363fc4cc67ed46f84bb3d63e0f2aab5f8bce539a21fca9cc9f517905ce26f40317770d33d7bbf91ab4
-
SSDEEP
1536:bkdW/z20+u4dXNR8WrlDn9lVYw7VM4kD2Fq5AGGzeQz4JnImgzP8RiPmHnClK+dr:beYw7Ev1P4RtluaB1
-
Asyncrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-